MARC details
000 -LEADER |
fixed length control field |
03503cam a22002775a 4500 |
001 - CONTROL NUMBER |
control field |
18128384 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150922133908.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140425s2014 nyua fr 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071807913 (paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071807918 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
EG-ScBUE |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV8079.C65 |
Item number |
W52 2014 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.25968028553 |
Edition number |
22 |
Item number |
WID |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Widup, Suzanne. |
9 (RLIN) |
38437 |
245 10 - TITLE STATEMENT |
Title |
Computer forensics and digital investigation with Encase Forensic v7 / |
Statement of responsibility, etc |
Suzanne Widup. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
MCGraw-Hill Education Books, |
Date of publication, distribution, etc |
c.2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xx, 426 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Index : p. 415-426. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"This practical, professional book provides a scenario-based guide to the industry's #1 digital forensics tool, EnCase Forensic Computer Forensics and Digital Investigation with EnCase Forensic shows how to uncover digital evidence in a fast, cost-effective, organized, and repeatable manner using the industry's leading digital investigation software. Part I addresses forensic readiness, setting up the software, and the basic interface. Part II lays out the case study used and how to navigate it step-by-step using the software. Part III details how to find clues and go deeper into investigations (finding hidden and deleted data). Part IV walks you through how to analyze the data, refine, and manipulate the results. Part V discusses the options for automating frequent tasks using EnCase Portable and the EnScript programming language. Sharpens the competitive edge of forensics practitioners through practice with the industry's #1 tool, EnCase Forensic Provides invaluable professional advice on the best working methods of digital forensic specialists An affordable learning option for this widely used tool Walks you through all the latest features to this first major software update in six years--EnCase Forensic v7 performs mobile device forensics (iPad, iPhone, Android, Blackberry, etc.), includes a completely revamped user interface, and streamlined organization of file, data, and report functions Commonly accessible evidence file toolkit allows you to put the book's case examples to the test "-- |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide.- Install EnCase Forensic v7 and customize the user interface - Prepare your investigation and set up a new case - Collect and verify evidence from suspect computers and networks - Use the EnCase Evidence Processor and Case Analyzer - Uncover clues using keyword searches and filter results through GREP - Work with bookmarks, timelines, hash sets, and libraries - Handle case closure, final disposition, and evidence destruction - Carry out field investigations using EnCase Portable - Learn to program in EnCase EnScript |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Investigation. |
Source of heading or term |
BUEsh |
9 (RLIN) |
11331 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Investigation |
-- |
Computer programs. |
Source of heading or term |
BUEsh |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
July2015 |
-- |
September2015 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |