Computer forensics and digital investigation with Encase Forensic v7 / (Record no. 20388)

MARC details
000 -LEADER
fixed length control field 03503cam a22002775a 4500
001 - CONTROL NUMBER
control field 18128384
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150922133908.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140425s2014 nyua fr 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071807913 (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071807918
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency EG-ScBUE
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8079.C65
Item number W52 2014
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25968028553
Edition number 22
Item number WID
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Widup, Suzanne.
9 (RLIN) 38437
245 10 - TITLE STATEMENT
Title Computer forensics and digital investigation with Encase Forensic v7 /
Statement of responsibility, etc Suzanne Widup.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc MCGraw-Hill Education Books,
Date of publication, distribution, etc c.2014.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 426 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Index : p. 415-426.
520 ## - SUMMARY, ETC.
Summary, etc "This practical, professional book provides a scenario-based guide to the industry's #1 digital forensics tool, EnCase Forensic Computer Forensics and Digital Investigation with EnCase Forensic shows how to uncover digital evidence in a fast, cost-effective, organized, and repeatable manner using the industry's leading digital investigation software. Part I addresses forensic readiness, setting up the software, and the basic interface. Part II lays out the case study used and how to navigate it step-by-step using the software. Part III details how to find clues and go deeper into investigations (finding hidden and deleted data). Part IV walks you through how to analyze the data, refine, and manipulate the results. Part V discusses the options for automating frequent tasks using EnCase Portable and the EnScript programming language. Sharpens the competitive edge of forensics practitioners through practice with the industry's #1 tool, EnCase Forensic Provides invaluable professional advice on the best working methods of digital forensic specialists An affordable learning option for this widely used tool Walks you through all the latest features to this first major software update in six years--EnCase Forensic v7 performs mobile device forensics (iPad, iPhone, Android, Blackberry, etc.), includes a completely revamped user interface, and streamlined organization of file, data, and report functions Commonly accessible evidence file toolkit allows you to put the book's case examples to the test "--
520 ## - SUMMARY, ETC.
Summary, etc "Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide.- Install EnCase Forensic v7 and customize the user interface - Prepare your investigation and set up a new case - Collect and verify evidence from suspect computers and networks - Use the EnCase Evidence Processor and Case Analyzer - Uncover clues using keyword searches and filter results through GREP - Work with bookmarks, timelines, hash sets, and libraries - Handle case closure, final disposition, and evidence destruction - Carry out field investigations using EnCase Portable - Learn to program in EnCase EnScript
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Investigation.
Source of heading or term BUEsh
9 (RLIN) 11331
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Investigation
-- Computer programs.
Source of heading or term BUEsh
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Informatics and Computer Science
Arrived date list July2015
-- September2015
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Koha collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Total Checkouts Full call number Barcode Date last seen Koha item type
    Dewey Decimal Classification     Baccah Central Library Central Library First floor 30/07/2015 Purchase 400.00 21759   363.25968028553 WID 000038975 11/06/2024 Book - Borrowing