Record ID | ia:guidetocomputerf0000nels |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/guidetocomputerf0000nels/guidetocomputerf0000nels_marc.xml |
Download MARC binary | https://www.archive.org/download/guidetocomputerf0000nels/guidetocomputerf0000nels_meta.mrc |
LEADER: 03527cam 2200697 a 4500
001 ocn473428121
003 OCoLC
005 20190103234115.0
008 090918s2010 nyua b 001 0 eng
006 m d
007 co ugu||||||||
040 $aUKM$beng$cUKM$dIBI$dJCR$dCRH$dBTCTA$dKSU$dYDXCP$dDEBBG$dUKMGB$dOCLCF$dOCLCO$dRIV$dOCLCQ$dS3O$dCNUTO$dYT1$dSFR$dOCLCQ$dOCLCO$dOCLCA$dBV1$dOKX$dOCLCQ$dZ5U$dOCLCQ$dOCLCA
015 $aGBA995553$2bnb
016 7 $a015381644$2Uk
019 $a432983886$a733993347$a970523365$a978216935$a1001886887$a1004948182$a1059557549$a1062106719$a1078111486
020 $a9781435498839$q(pbk.)
020 $a1435498836$q(pbk.)
020 $a0619217065
020 $a9780619217068
035 $a(OCoLC)473428121$z(OCoLC)432983886$z(OCoLC)733993347$z(OCoLC)970523365$z(OCoLC)978216935$z(OCoLC)1001886887$z(OCoLC)1004948182$z(OCoLC)1059557549$z(OCoLC)1062106719$z(OCoLC)1078111486
042 $aukblcatcopy
050 14 $aHV8079.C65$bG85 2010
082 04 $a005.8$222
100 1 $aNelson, Bill.
245 10 $aGuide to computer forensics and investigations /$cBill Nelson, Amelia Phillips, Christopher Steuart.
246 30 $aComputer forensics and investigations
250 $a4th ed.
260 $aBoston, MA :$bCourse Technology Cengage Learning,$c℗♭2010.
300 $axxv, 682 pages :$billustrations ;$c24 cm +$e1 DVD-ROM (4 3/4 in.)
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
347 $adata file$2rda
538 $aSystem requirements for accompanying DVD-ROM: PC running Windows ; or Macintosh running MAC OS ; Microsoft Word ; Excel ; Video player ; Zip ; DVD-ROM drive.
500 $aAccompanying DVD-ROM contains tutorials, project files and software tools.
504 $aIncludes bibliographical references (pages 607-611) and index.
505 0 $aComputer forensics and investigations as a profession -- Understanding computing investigations -- The investigator's office and laboratory -- Data acquisition -- Processing crime and incident scenes -- Working with Windows and DOS systems -- Current computer forensics tools -- Macintosh and Linux boot processes and file systems -- Computer forensics analysis and validation -- Recovering graphics files -- Virtual machines, network forensics, and live acquisitions -- E-mail investigations -- Cell phone and mobile device forensics -- Report writing for high-tech investigations -- Expert testimony in high-tech investigations -- Ethics for the expert witness.
650 0 $aComputer security.
650 0 $aComputer crimes$xInvestigation.
650 7 $aComputer crimes$xInvestigation.$2fast$0(OCoLC)fst00872065
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aAufkla rung$gKriminologie$2gnd
650 7 $aComputerkriminalita t$2gnd
650 7 $aIT-forensisk verksamhet.$2sao
650 7 $aBrottsutredning.$2sao
650 7 $aIT-sa kerhet.$2sao
650 7 $aDatabrott.$2sao
700 1 $aPhillips, Amelia.
700 1 $aSteuart, Christopher.
938 $aBaker and Taylor$bBTCP$nBK0008534026
938 $aYBP Library Services$bYANK$n3093016
029 1 $aAU@$b000044884701
029 1 $aAU@$b000044955753
029 1 $aAU@$b000045159101
029 1 $aAU@$b000045172366
029 1 $aAU@$b000062305636
029 1 $aDEBBG$bBV037393204
029 1 $aNZ1$b13229290
029 1 $aUKMGB$b015381644
994 $aZ0$bP4A
948 $hHELD BY P4A - 140 OTHER HOLDINGS