Windows forensic analysis: DVD toolkit
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Incident response and cybercrime investigation secrets"--Cover Includes bibliographical references and index Front Cover; Windows Forensic Analysis: DVD Toolkit; Copyright Page; Contents; Preface; Chapter 1. Live Response: Collecting Volatile Data; Chapter 2. Live Response: Data Analysis; Chapter 3. Windows Memory Analysis; Chapter 4. Registry Analysis; Chapter 5. File Analysis; Chapter 6. Executable File Analysis; Chapter 7. Rootkits and Rootkit Detection; Index; Syngress: The Definition of a Serious Security Library If you want to know the secrets to incident response and investigating cyber crime on Windows systems, this is THE book and DVD package! |
Beschreibung: | 1 Online-Ressource (xxvi, 348 p.) |
ISBN: | 0080556442 9780080556444 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043061985 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080556442 |c electronic bk. |9 0-08-055644-2 | ||
020 | |a 9780080556444 |c electronic bk. |9 978-0-08-055644-4 | ||
035 | |a (OCoLC)190823327 | ||
035 | |a (DE-599)BVBBV043061985 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.25/0968 |2 22 | |
100 | 1 | |a Carvey, Harlan A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Windows forensic analysis |b DVD toolkit |c Harlan Carvey |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c c2007 | |
300 | |a 1 Online-Ressource (xxvi, 348 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Incident response and cybercrime investigation secrets"--Cover | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Front Cover; Windows Forensic Analysis: DVD Toolkit; Copyright Page; Contents; Preface; Chapter 1. Live Response: Collecting Volatile Data; Chapter 2. Live Response: Data Analysis; Chapter 3. Windows Memory Analysis; Chapter 4. Registry Analysis; Chapter 5. File Analysis; Chapter 6. Executable File Analysis; Chapter 7. Rootkits and Rootkit Detection; Index; Syngress: The Definition of a Serious Security Library | ||
500 | |a If you want to know the secrets to incident response and investigating cyber crime on Windows systems, this is THE book and DVD package! | ||
630 | 0 | 4 | |a Microsoft Windows (Computer file) |x Security measures |
650 | 7 | |a LAW / Forensic Science |2 bisacsh | |
650 | 4 | |a Computer crimes |x Investigation |z United States |x Methodology | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datei |0 (DE-588)4148864-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wiederherstellung |g Informatik |0 (DE-588)4177289-1 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a Datei |0 (DE-588)4148864-7 |D s |
689 | 0 | 2 | |a Wiederherstellung |g Informatik |0 (DE-588)4177289-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-59749-156-X |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-59749-156-3 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214746 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028486177 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214746 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214746 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175437638664192 |
---|---|
any_adam_object | |
author | Carvey, Harlan A. |
author_facet | Carvey, Harlan A. |
author_role | aut |
author_sort | Carvey, Harlan A. |
author_variant | h a c ha hac |
building | Verbundindex |
bvnumber | BV043061985 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)190823327 (DE-599)BVBBV043061985 |
dewey-full | 363.25/0968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/0968 |
dewey-search | 363.25/0968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03040nmm a2200577zc 4500</leader><controlfield tag="001">BV043061985</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080556442</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055644-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080556444</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055644-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)190823327</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043061985</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/0968</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carvey, Harlan A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Windows forensic analysis</subfield><subfield code="b">DVD toolkit</subfield><subfield code="c">Harlan Carvey</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 348 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Incident response and cybercrime investigation secrets"--Cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Front Cover; Windows Forensic Analysis: DVD Toolkit; Copyright Page; Contents; Preface; Chapter 1. Live Response: Collecting Volatile Data; Chapter 2. Live Response: Data Analysis; Chapter 3. Windows Memory Analysis; Chapter 4. Registry Analysis; Chapter 5. File Analysis; Chapter 6. Executable File Analysis; Chapter 7. Rootkits and Rootkit Detection; Index; Syngress: The Definition of a Serious Security Library</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">If you want to know the secrets to incident response and investigating cyber crime on Windows systems, this is THE book and DVD package!</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Forensic Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="z">United States</subfield><subfield code="x">Methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datei</subfield><subfield code="0">(DE-588)4148864-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wiederherstellung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4177289-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datei</subfield><subfield code="0">(DE-588)4148864-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Wiederherstellung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4177289-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-59749-156-X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-59749-156-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214746</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028486177</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214746</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214746</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043061985 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:17Z |
institution | BVB |
isbn | 0080556442 9780080556444 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028486177 |
oclc_num | 190823327 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxvi, 348 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Carvey, Harlan A. Verfasser aut Windows forensic analysis DVD toolkit Harlan Carvey Burlington, MA Syngress Pub. c2007 1 Online-Ressource (xxvi, 348 p.) txt rdacontent c rdamedia cr rdacarrier "Incident response and cybercrime investigation secrets"--Cover Includes bibliographical references and index Front Cover; Windows Forensic Analysis: DVD Toolkit; Copyright Page; Contents; Preface; Chapter 1. Live Response: Collecting Volatile Data; Chapter 2. Live Response: Data Analysis; Chapter 3. Windows Memory Analysis; Chapter 4. Registry Analysis; Chapter 5. File Analysis; Chapter 6. Executable File Analysis; Chapter 7. Rootkits and Rootkit Detection; Index; Syngress: The Definition of a Serious Security Library If you want to know the secrets to incident response and investigating cyber crime on Windows systems, this is THE book and DVD package! Microsoft Windows (Computer file) Security measures LAW / Forensic Science bisacsh Computer crimes Investigation United States Methodology Computer networks Security measures Internet Security measures Computer security Computerforensik (DE-588)4774034-6 gnd rswk-swf Datei (DE-588)4148864-7 gnd rswk-swf Wiederherstellung Informatik (DE-588)4177289-1 gnd rswk-swf USA Computerforensik (DE-588)4774034-6 s Datei (DE-588)4148864-7 s Wiederherstellung Informatik (DE-588)4177289-1 s 1\p DE-604 Erscheint auch als Druck-Ausgabe, Paperback 1-59749-156-X Erscheint auch als Druck-Ausgabe, Paperback 978-1-59749-156-3 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214746 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Carvey, Harlan A. Windows forensic analysis DVD toolkit Microsoft Windows (Computer file) Security measures LAW / Forensic Science bisacsh Computer crimes Investigation United States Methodology Computer networks Security measures Internet Security measures Computer security Computerforensik (DE-588)4774034-6 gnd Datei (DE-588)4148864-7 gnd Wiederherstellung Informatik (DE-588)4177289-1 gnd |
subject_GND | (DE-588)4774034-6 (DE-588)4148864-7 (DE-588)4177289-1 |
title | Windows forensic analysis DVD toolkit |
title_auth | Windows forensic analysis DVD toolkit |
title_exact_search | Windows forensic analysis DVD toolkit |
title_full | Windows forensic analysis DVD toolkit Harlan Carvey |
title_fullStr | Windows forensic analysis DVD toolkit Harlan Carvey |
title_full_unstemmed | Windows forensic analysis DVD toolkit Harlan Carvey |
title_short | Windows forensic analysis |
title_sort | windows forensic analysis dvd toolkit |
title_sub | DVD toolkit |
topic | Microsoft Windows (Computer file) Security measures LAW / Forensic Science bisacsh Computer crimes Investigation United States Methodology Computer networks Security measures Internet Security measures Computer security Computerforensik (DE-588)4774034-6 gnd Datei (DE-588)4148864-7 gnd Wiederherstellung Informatik (DE-588)4177289-1 gnd |
topic_facet | Microsoft Windows (Computer file) Security measures LAW / Forensic Science Computer crimes Investigation United States Methodology Computer networks Security measures Internet Security measures Computer security Computerforensik Datei Wiederherstellung Informatik USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214746 |
work_keys_str_mv | AT carveyharlana windowsforensicanalysisdvdtoolkit |