MARC details
000 -LEADER |
fixed length control field |
01988cam a22003015a 4500 |
001 - CONTROL NUMBER |
control field |
18335154 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150816113426.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
141015t2014 maua frbd 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1284031055 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284031058 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
SCO |
Language of cataloging |
eng |
Transcribing agency |
SCO |
Modifying agency |
EG-ScBUE |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.25968 |
Item number |
EAS |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Easttom, Chuck. |
9 (RLIN) |
38311 |
245 10 - TITLE STATEMENT |
Title |
System forensics, investigation, and response / |
Statement of responsibility, etc |
Chuck Easttom. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Burlington : |
Name of publisher, distributor, etc |
Jones & Bartlett Learning, |
Date of publication, distribution, etc |
c.2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 315 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
490 1# - SERIES STATEMENT |
Series statement |
Jones & Bartlett Learning information systems security & assurance series |
500 ## - GENERAL NOTE |
General note |
Glossary : p. 295-299. |
500 ## - GENERAL NOTE |
General note |
Index : p. 303-315. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Bibliography : p. 301-302. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Completely revised and rewritten to keep pace with the fast-paced field of Computer Forensics! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response, Second Edition begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field. New and key features of the Second Edition: Examines the fundamentals of system forensics; Discusses computer crimes and forensic methods; Written in an accessible and engaging style; Incorporates real-world examples and engaging cases."--Publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Investigation. |
9 (RLIN) |
11331 |
Source of heading or term |
BUEsh |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
June2015 |
-- |
August2015 |
655 ## - INDEX TERM--GENRE/FORM |
Form subdivision |
Reading book |
-- |
34232 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Call number prefix |
363.25968 EAS |