Handbook of computer crime investigation: forensic tools and technology
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
San Diego, Calif.
Academic Press
c2002
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index The other side of civil discovery / Troy Larson -- The EnCase process / John Patzakis -- Incident response tools / Steve Romig -- NFR security / Karen Frederick -- Tool testing and analytical methodology / Curt Bryson and Scott Stevens -- Forensic analysis of Windows systems / Bob Sheldon -- UNIX system analysis / Keith Seglem, Mark Luque, and Sigurd Murphy -- Network analysis / Eoghan Casey, Troy Larson, and H. Morrow Long -- Wireless network analysis / K. Edward Gibbs and David F. Clark -- Embedded systems analysis / Ronald van der Knijff -- Homicide and child pornography / J.J. McLean -- Investigating internet gambling / Todd G. Shipley -- Computer intrusions / Steve Romig |
Beschreibung: | 1 Online-Ressource (xiv, 448 p.) |
ISBN: | 0080488900 0121631036 9780080488905 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043169654 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2002 |||| o||u| ||||||eng d | ||
020 | |a 0080488900 |c electronic bk. |9 0-08-048890-0 | ||
020 | |a 0121631036 |9 0-12-163103-6 | ||
020 | |a 9780080488905 |c electronic bk. |9 978-0-08-048890-5 | ||
035 | |a (OCoLC)148068701 | ||
035 | |a (DE-599)BVBBV043169654 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.25/968 |2 22 | |
245 | 1 | 0 | |a Handbook of computer crime investigation |b forensic tools and technology |c edited by Eoghan Casey |
246 | 1 | 3 | |a Computer crime investigation |
264 | 1 | |a San Diego, Calif. |b Academic Press |c c2002 | |
300 | |a 1 Online-Ressource (xiv, 448 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a The other side of civil discovery / Troy Larson -- The EnCase process / John Patzakis -- Incident response tools / Steve Romig -- NFR security / Karen Frederick -- Tool testing and analytical methodology / Curt Bryson and Scott Stevens -- Forensic analysis of Windows systems / Bob Sheldon -- UNIX system analysis / Keith Seglem, Mark Luque, and Sigurd Murphy -- Network analysis / Eoghan Casey, Troy Larson, and H. Morrow Long -- Wireless network analysis / K. Edward Gibbs and David F. Clark -- Embedded systems analysis / Ronald van der Knijff -- Homicide and child pornography / J.J. McLean -- Investigating internet gambling / Todd G. Shipley -- Computer intrusions / Steve Romig | ||
650 | 4 | |a Criminalité informatique / Enquêtes / Guides, manuels, etc | |
650 | 4 | |a Preuve (Droit pénal) / Guides, manuels, etc | |
650 | 4 | |a Criminalistique / Guides, manuels, etc | |
650 | 7 | |a LAW / Forensic Science |2 bisacsh | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Evidence, Criminal |2 fast | |
650 | 7 | |a Forensic sciences |2 fast | |
650 | 4 | |a Computer crimes |x Investigation |v Handbooks, manuals, etc | |
650 | 4 | |a Evidence, Criminal |v Handbooks, manuals, etc | |
650 | 4 | |a Forensic sciences |v Handbooks, manuals, etc | |
650 | 0 | 7 | |a Ermittlung |0 (DE-588)4070924-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Ermittlung |0 (DE-588)4070924-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Casey, Eoghan |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196115 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028593845 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196115 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196115 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175648548192256 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043169654 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)148068701 (DE-599)BVBBV043169654 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03257nmm a2200589zc 4500</leader><controlfield tag="001">BV043169654</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080488900</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-048890-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0121631036</subfield><subfield code="9">0-12-163103-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488905</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-048890-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)148068701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043169654</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of computer crime investigation</subfield><subfield code="b">forensic tools and technology</subfield><subfield code="c">edited by Eoghan Casey</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Computer crime investigation</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Diego, Calif.</subfield><subfield code="b">Academic Press</subfield><subfield code="c">c2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 448 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The other side of civil discovery / Troy Larson -- The EnCase process / John Patzakis -- Incident response tools / Steve Romig -- NFR security / Karen Frederick -- Tool testing and analytical methodology / Curt Bryson and Scott Stevens -- Forensic analysis of Windows systems / Bob Sheldon -- UNIX system analysis / Keith Seglem, Mark Luque, and Sigurd Murphy -- Network analysis / Eoghan Casey, Troy Larson, and H. Morrow Long -- Wireless network analysis / K. Edward Gibbs and David F. Clark -- Embedded systems analysis / Ronald van der Knijff -- Homicide and child pornography / J.J. McLean -- Investigating internet gambling / Todd G. Shipley -- Computer intrusions / Steve Romig</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique / Enquêtes / Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Preuve (Droit pénal) / Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalistique / Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Forensic Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Evidence, Criminal</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Forensic sciences</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Evidence, Criminal</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ermittlung</subfield><subfield code="0">(DE-588)4070924-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Ermittlung</subfield><subfield code="0">(DE-588)4070924-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casey, Eoghan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196115</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028593845</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196115</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196115</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043169654 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:38Z |
institution | BVB |
isbn | 0080488900 0121631036 9780080488905 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028593845 |
oclc_num | 148068701 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiv, 448 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Academic Press |
record_format | marc |
spelling | Handbook of computer crime investigation forensic tools and technology edited by Eoghan Casey Computer crime investigation San Diego, Calif. Academic Press c2002 1 Online-Ressource (xiv, 448 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index The other side of civil discovery / Troy Larson -- The EnCase process / John Patzakis -- Incident response tools / Steve Romig -- NFR security / Karen Frederick -- Tool testing and analytical methodology / Curt Bryson and Scott Stevens -- Forensic analysis of Windows systems / Bob Sheldon -- UNIX system analysis / Keith Seglem, Mark Luque, and Sigurd Murphy -- Network analysis / Eoghan Casey, Troy Larson, and H. Morrow Long -- Wireless network analysis / K. Edward Gibbs and David F. Clark -- Embedded systems analysis / Ronald van der Knijff -- Homicide and child pornography / J.J. McLean -- Investigating internet gambling / Todd G. Shipley -- Computer intrusions / Steve Romig Criminalité informatique / Enquêtes / Guides, manuels, etc Preuve (Droit pénal) / Guides, manuels, etc Criminalistique / Guides, manuels, etc LAW / Forensic Science bisacsh Computer crimes / Investigation fast Evidence, Criminal fast Forensic sciences fast Computer crimes Investigation Handbooks, manuals, etc Evidence, Criminal Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Ermittlung (DE-588)4070924-3 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Ermittlung (DE-588)4070924-3 s 1\p DE-604 Computerkriminalität (DE-588)4010452-7 s 2\p DE-604 Casey, Eoghan Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196115 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Handbook of computer crime investigation forensic tools and technology Criminalité informatique / Enquêtes / Guides, manuels, etc Preuve (Droit pénal) / Guides, manuels, etc Criminalistique / Guides, manuels, etc LAW / Forensic Science bisacsh Computer crimes / Investigation fast Evidence, Criminal fast Forensic sciences fast Computer crimes Investigation Handbooks, manuals, etc Evidence, Criminal Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Ermittlung (DE-588)4070924-3 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4070924-3 (DE-588)4010452-7 |
title | Handbook of computer crime investigation forensic tools and technology |
title_alt | Computer crime investigation |
title_auth | Handbook of computer crime investigation forensic tools and technology |
title_exact_search | Handbook of computer crime investigation forensic tools and technology |
title_full | Handbook of computer crime investigation forensic tools and technology edited by Eoghan Casey |
title_fullStr | Handbook of computer crime investigation forensic tools and technology edited by Eoghan Casey |
title_full_unstemmed | Handbook of computer crime investigation forensic tools and technology edited by Eoghan Casey |
title_short | Handbook of computer crime investigation |
title_sort | handbook of computer crime investigation forensic tools and technology |
title_sub | forensic tools and technology |
topic | Criminalité informatique / Enquêtes / Guides, manuels, etc Preuve (Droit pénal) / Guides, manuels, etc Criminalistique / Guides, manuels, etc LAW / Forensic Science bisacsh Computer crimes / Investigation fast Evidence, Criminal fast Forensic sciences fast Computer crimes Investigation Handbooks, manuals, etc Evidence, Criminal Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Ermittlung (DE-588)4070924-3 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Criminalité informatique / Enquêtes / Guides, manuels, etc Preuve (Droit pénal) / Guides, manuels, etc Criminalistique / Guides, manuels, etc LAW / Forensic Science Computer crimes / Investigation Evidence, Criminal Forensic sciences Computer crimes Investigation Handbooks, manuals, etc Evidence, Criminal Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Ermittlung Computerkriminalität |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196115 |
work_keys_str_mv | AT caseyeoghan handbookofcomputercrimeinvestigationforensictoolsandtechnology AT caseyeoghan computercrimeinvestigation |