Computer forensics: a pocket guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2010
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references Ch. 1. The role of forensics within organisations -- Ch. 2. Be prepared proactive forensics --Ch. 3. Forensic acquisition of data -- Ch. 4. Forensic analysis of data -- Ch. 5. Anti-forensics and encryption -- Ch. 6. Embedded and network forensics This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required |
Beschreibung: | 1 Online-Ressource (75 pages) |
ISBN: | 1849280398 1849280401 9781849280396 9781849280402 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043125325 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2010 |||| o||u| ||||||eng d | ||
020 | |a 1849280398 |9 1-84928-039-8 | ||
020 | |a 1849280401 |9 1-84928-040-1 | ||
020 | |a 9781849280396 |9 978-1-84928-039-6 | ||
020 | |a 9781849280402 |9 978-1-84928-040-2 | ||
035 | |a (OCoLC)662258332 | ||
035 | |a (DE-599)BVBBV043125325 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Clarke, Nathan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer forensics |b a pocket guide |c Nathan Clarke |
264 | 1 | |a Ely |b IT Governance Pub. |c 2010 | |
300 | |a 1 Online-Ressource (75 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
500 | |a Ch. 1. The role of forensics within organisations -- Ch. 2. Be prepared proactive forensics --Ch. 3. Forensic acquisition of data -- Ch. 4. Forensic analysis of data -- Ch. 5. Anti-forensics and encryption -- Ch. 6. Embedded and network forensics | ||
500 | |a This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required | ||
650 | 4 | |a Computer Science / IT. | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer crimes / Investigation | |
650 | 4 | |a Forensic sciences | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Forensic sciences |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Forensic sciences | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391122 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028549516 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391122 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391122 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175558865584128 |
---|---|
any_adam_object | |
author | Clarke, Nathan |
author_facet | Clarke, Nathan |
author_role | aut |
author_sort | Clarke, Nathan |
author_variant | n c nc |
building | Verbundindex |
bvnumber | BV043125325 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)662258332 (DE-599)BVBBV043125325 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02744nmm a2200589zc 4500</leader><controlfield tag="001">BV043125325</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280398</subfield><subfield code="9">1-84928-039-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280401</subfield><subfield code="9">1-84928-040-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280396</subfield><subfield code="9">978-1-84928-039-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280402</subfield><subfield code="9">978-1-84928-040-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)662258332</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043125325</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clarke, Nathan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer forensics</subfield><subfield code="b">a pocket guide</subfield><subfield code="c">Nathan Clarke</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (75 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Ch. 1. The role of forensics within organisations -- Ch. 2. Be prepared proactive forensics --Ch. 3. Forensic acquisition of data -- Ch. 4. Forensic analysis of data -- Ch. 5. Anti-forensics and encryption -- Ch. 6. Embedded and network forensics</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science / IT.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Forensic sciences</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391122</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028549516</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391122</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391122</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043125325 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:12Z |
institution | BVB |
isbn | 1849280398 1849280401 9781849280396 9781849280402 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028549516 |
oclc_num | 662258332 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (75 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Clarke, Nathan Verfasser aut Computer forensics a pocket guide Nathan Clarke Ely IT Governance Pub. 2010 1 Online-Ressource (75 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references Ch. 1. The role of forensics within organisations -- Ch. 2. Be prepared proactive forensics --Ch. 3. Forensic acquisition of data -- Ch. 4. Forensic analysis of data -- Ch. 5. Anti-forensics and encryption -- Ch. 6. Embedded and network forensics This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required Computer Science / IT. Computer security Computer networks / Security measures Computer crimes / Investigation Forensic sciences COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Forensic sciences fast Informatik Computer crimes Investigation Computer networks Security measures http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391122 Aggregator Volltext |
spellingShingle | Clarke, Nathan Computer forensics a pocket guide Computer Science / IT. Computer security Computer networks / Security measures Computer crimes / Investigation Forensic sciences COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Forensic sciences fast Informatik Computer crimes Investigation Computer networks Security measures |
title | Computer forensics a pocket guide |
title_auth | Computer forensics a pocket guide |
title_exact_search | Computer forensics a pocket guide |
title_full | Computer forensics a pocket guide Nathan Clarke |
title_fullStr | Computer forensics a pocket guide Nathan Clarke |
title_full_unstemmed | Computer forensics a pocket guide Nathan Clarke |
title_short | Computer forensics |
title_sort | computer forensics a pocket guide |
title_sub | a pocket guide |
topic | Computer Science / IT. Computer security Computer networks / Security measures Computer crimes / Investigation Forensic sciences COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Forensic sciences fast Informatik Computer crimes Investigation Computer networks Security measures |
topic_facet | Computer Science / IT. Computer security Computer networks / Security measures Computer crimes / Investigation Forensic sciences COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Informatik Computer crimes Investigation Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391122 |
work_keys_str_mv | AT clarkenathan computerforensicsapocketguide |