Computer forensies : jumpstart
A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools.
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, Indiana :
Wiley Publishing ,
c2011
|
| Edition: | 2nd ed |
| Subjects: | |
| Online Access: | Table of contents only Contributor biographical information Publisher description |
MARC
| LEADER | 00000cam a2200000 7i4500 | ||
|---|---|---|---|
| 001 | 0000073574 | ||
| 005 | 20200315.0 | ||
| 008 | 110615s2010 inu eng | ||
| 020 | |a 0470931663 (paperback : alk. paper) | ||
| 020 | |a 1118067576 (e-book) | ||
| 020 | |a 1118067649 (e-book) | ||
| 020 | |a 1118067657 (e-book) | ||
| 020 | |a 9780470931660 (paperback : alk. paper) | ||
| 020 | |a 9781118067574 (e-book) | ||
| 020 | |a 9781118067642 (e-book) | ||
| 020 | |a 9781118067659 (e-book) | ||
| 050 | 0 | 0 | |a QA76.9.A25 |b C66 2011 |
| 090 | 0 | 0 | |a QA76.9.A25 |b C66 2011 |
| 245 | 0 | 0 | |a Computer forensies : |b jumpstart |c Michael G.Solomon ... [et al.] |
| 246 | 3 | 0 | |a JumpStart |
| 250 | |a 2nd ed | ||
| 260 | |a Indianapolis, Indiana : |b Wiley Publishing , |c c2011 | ||
| 300 | |a xx, 316 p. : |b ill. ; |c 24 cm. | ||
| 500 | |a Previous ed.: San Francisco, Calif.; London: SYBEX, 2005 | ||
| 504 | |a Includes bibliographical references (p. 271-281) and index | ||
| 505 | 0 | |a 1. The need for computer forensics -- 2. Preparation -- what to do before you start -- 3. Computer evidence -- 4. Common tasks -- 5. Capturing the data image -- 6. Extracting information from data -- 7. Passwords and encryption -- 8. Common forensics tools -- 9. Pulling it all together -- 10. How to testify in court | |
| 520 | |a A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools. | ||
| 650 | 0 | |a Computer crimes |x Accidents |x Investigation | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Forensic sciences | |
| 700 | 1 | |a Solomon, Michael [ |q (Michael G.)] , |d 1963- , |e author | |
| 856 | 4 | 1 | |3 Table of contents only |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-t.html |
| 856 | 4 | 2 | |3 Contributor biographical information |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-b.html |
| 856 | 4 | 2 | |3 Publisher description |u http://www.loc.gov/catdir/enhancements/fy1117/2011288103-d.html |
| 999 | |a 1000141435 |b Book |c OPEN SHELF (30 DAYS) |e Tembila Campus | ||
| 999 | |a 1000146748 |b Book |c OPEN SHELF (30 DAYS) |e Tembila Campus | ||