|
|
|
|
| LEADER |
00000cam a2200000 7i4500 |
| 001 |
0000090038 |
| 005 |
20200315.0 |
| 008 |
161012s2011 inu eng |
| 020 |
|
|
|a 0470931663
|
| 020 |
|
|
|a 9780470931660
|
| 050 |
0 |
0 |
|a QA76.9.A25
|b S65 2011
|
| 090 |
0 |
0 |
|a QA76.9.A25
|b S65 2011
|
| 100 |
1 |
|
|a Solomon, Michael [
|q (Michael G.)] ,
|d 1963- ,
|e author
|
| 245 |
1 |
0 |
|a Computer forensics jumpstart
|c Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom and Diane Barrett
|
| 246 |
3 |
0 |
|a JumpStart
|
| 250 |
|
|
|a 2nd ed
|
| 260 |
|
|
|a Indianapolis, Indiana :
|b Wiley ,
|c c2011
|
| 300 |
|
|
|a xx, 316 p. :
|b ill. ;
|c 24 cm.
|
| 504 |
|
|
|a Includes bibliographical references and index
|
| 505 |
0 |
|
|a 1. The need for computer forensics -- 2. Preparation--what to do before you start -- 3. Computer evidence -- 4. Common tasks -- 5. Capturing the data image -- 6. Extracting information from data 7. Passwords and encryption -- 8. Common forensics tools -- 9. Pulling it all together -- 10. How to testify in court
|
| 520 |
|
|
|a A guide to computer forensics provides information on such topics as conducting a forensics investigation, finding hidden data, capturing images, collecting and preserving computer evidence, and using computer forensic tools
|
| 650 |
|
0 |
|a Computer crimes
|x Accidents
|x Investigation
|
| 650 |
|
0 |
|a Computer networks
|x Security measures
|
| 650 |
|
0 |
|a Computer security
|
| 650 |
|
0 |
|a Forensic sciences
|
| 700 |
1 |
|
|a Barrett, Diane ,
|e author
|
| 700 |
1 |
|
|a Broom, Neil ,
|e author
|
| 700 |
1 |
|
|a Rudolph, K. ,
|e author
|
| 700 |
1 |
|
|a Tittel, Ed ,
|e author
|
| 999 |
|
|
|a 1000167214
|b Book
|c OPEN SHELF (30 DAYS)
|e Tembila Campus
|
| 999 |
|
|
|a 1000167215
|b Book
|c OPEN SHELF (30 DAYS)
|e Tembila Campus
|