000 | 01988cam a22003015a 4500 | ||
---|---|---|---|
001 | 18335154 | ||
005 | 20150816113426.0 | ||
008 | 141015t2014 maua frbd 001 0 eng d | ||
020 | _a1284031055 | ||
020 | _a9781284031058 | ||
040 |
_aSCO _beng _cSCO _dEG-ScBUE |
||
082 | 0 | 4 |
_a363.25968 _bEAS _222 |
100 | 1 |
_aEasttom, Chuck. _938311 |
|
245 | 1 | 0 |
_aSystem forensics, investigation, and response / _cChuck Easttom. |
250 | _a2nd ed. | ||
260 |
_aBurlington : _bJones & Bartlett Learning, _cc.2014. |
||
300 |
_axvi, 315 p. : _bill. ; _c24 cm. |
||
490 | 1 | _aJones & Bartlett Learning information systems security & assurance series | |
500 | _aGlossary : p. 295-299. | ||
500 | _aIndex : p. 303-315. | ||
504 | _aBibliography : p. 301-302. | ||
520 | _a"Completely revised and rewritten to keep pace with the fast-paced field of Computer Forensics! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response, Second Edition begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field. New and key features of the Second Edition: Examines the fundamentals of system forensics; Discusses computer crimes and forensic methods; Written in an accessible and engaging style; Incorporates real-world examples and engaging cases."--Publisher. | ||
650 | 0 |
_a Computer crimes _xInvestigation. _911331 _2BUEsh |
|
651 | _2BUEsh | ||
653 |
_bCOMSCI _cJune2015 _cAugust2015 |
||
655 |
_vreading book _934232 |
||
942 |
_2ddc _k363.25968 EAS |
||
999 |
_c19773 _d19745 |