|
|
|
|
LEADER |
03236nmm a2200553 u 4500 |
001 |
EB001914839 |
003 |
EBX01000000000000001077741 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9780672333989
|
020 |
|
|
|a 0672333988
|
020 |
|
|
|a 9781282692022
|
020 |
|
|
|a 9786612692024
|
020 |
|
|
|a 128269202X
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Kruse, Warren G.
|
245 |
0 |
0 |
|a Computer forensics
|b incident response essentials
|c Warren G. Kruse II, Jay G. Heiser
|
260 |
|
|
|a Boston, MA
|b Addison-Wesley
|c 2001
|
300 |
|
|
|a xiii, 392
|b illustrations
|
505 |
0 |
|
|a Introduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system
|
505 |
0 |
|
|a Includes bibliographical references (pages 381-384) and index
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Criminalistique
|
653 |
|
|
|a Forensic sciences / fast
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a forensic science / aat
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Computercriminaliteit / gtt
|
653 |
|
|
|a Computerbeveiliging / gtt
|
653 |
|
|
|a Forensic Sciences
|
653 |
|
|
|a Gerechtelijke technologie / gtt
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer Security
|
653 |
|
|
|a Forensic sciences / http://id.loc.gov/authorities/subjects/sh90001487
|
700 |
1 |
|
|a Heiser, Jay G.
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002
|
776 |
|
|
|z 9780201707199
|
776 |
|
|
|z 0201707195
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780672333989/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 363.25968
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a "Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered." "Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography."--Jacket
|