System forensics, investigation, and response / (Record no. 19773)

MARC details
000 -LEADER
fixed length control field 01988cam a22003015a 4500
001 - CONTROL NUMBER
control field 18335154
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150816113426.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141015t2014 maua frbd 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1284031055
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284031058
040 ## - CATALOGING SOURCE
Original cataloging agency SCO
Language of cataloging eng
Transcribing agency SCO
Modifying agency EG-ScBUE
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25968
Item number EAS
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Easttom, Chuck.
9 (RLIN) 38311
245 10 - TITLE STATEMENT
Title System forensics, investigation, and response /
Statement of responsibility, etc Chuck Easttom.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington :
Name of publisher, distributor, etc Jones & Bartlett Learning,
Date of publication, distribution, etc c.2014.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 315 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 1# - SERIES STATEMENT
Series statement Jones & Bartlett Learning information systems security & assurance series
500 ## - GENERAL NOTE
General note Glossary : p. 295-299.
500 ## - GENERAL NOTE
General note Index : p. 303-315.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Bibliography : p. 301-302.
520 ## - SUMMARY, ETC.
Summary, etc "Completely revised and rewritten to keep pace with the fast-paced field of Computer Forensics! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response, Second Edition begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field. New and key features of the Second Edition: Examines the fundamentals of system forensics; Discusses computer crimes and forensic methods; Written in an accessible and engaging style; Incorporates real-world examples and engaging cases."--Publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Investigation.
9 (RLIN) 11331
Source of heading or term BUEsh
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Informatics and Computer Science
Arrived date list June2015
-- August2015
655 ## - INDEX TERM--GENRE/FORM
Form subdivision Reading book
-- 34232
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Call number prefix 363.25968 EAS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Koha collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Cost, replacement price Koha item type
    Dewey Decimal Classification     Alahram Central Library Central Library First floor 18/06/2015 Purchase 448.00 319 1 6 363.25968 EAS 000038785 11/06/2024 22/04/2024 560.00 Book - Borrowing