Computer Forensics with FTK:
This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2014
|
Schlagworte: | |
Zusammenfassung: | This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated platform. Whether you are new to Computer Forensics or have some experience, this book will help you get started with FTK so you can analyze evidence effectively and efficiently. If you are a law enforcement official, corporate security, or IT professional who needs to evaluate the evidentiary value of digital evidence, then this book is ideal for you |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (134 pages) |
ISBN: | 9781783559039 9781783559022 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043608367 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781783559039 |9 978-1-78355-903-9 | ||
020 | |a 9781783559022 |c Print |9 978-1-78355-902-2 | ||
035 | |a (ZDB-30-PQE)EBC1657797 | ||
035 | |a (ZDB-89-EBL)EBL1657797 | ||
035 | |a (ZDB-38-EBR)ebr10851721 | ||
035 | |a (OCoLC)973281621 | ||
035 | |a (DE-599)BVBBV043608367 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Carbone, Fernando |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer Forensics with FTK |
264 | 1 | |a Birmingham |b Packt Publishing |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (134 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated platform. Whether you are new to Computer Forensics or have some experience, this book will help you get started with FTK so you can analyze evidence effectively and efficiently. If you are a law enforcement official, corporate security, or IT professional who needs to evaluate the evidentiary value of digital evidence, then this book is ideal for you | ||
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Forensic sciences | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Carbone, Fernando |t Computer Forensics with FTK |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029022426 |
Datensatz im Suchindex
_version_ | 1804176354846965760 |
---|---|
any_adam_object | |
author | Carbone, Fernando |
author_facet | Carbone, Fernando |
author_role | aut |
author_sort | Carbone, Fernando |
author_variant | f c fc |
building | Verbundindex |
bvnumber | BV043608367 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1657797 (ZDB-89-EBL)EBL1657797 (ZDB-38-EBR)ebr10851721 (OCoLC)973281621 (DE-599)BVBBV043608367 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01959nmm a2200397zc 4500</leader><controlfield tag="001">BV043608367</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783559039</subfield><subfield code="9">978-1-78355-903-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783559022</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-78355-902-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1657797</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1657797</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10851721</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)973281621</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043608367</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carbone, Fernando</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Forensics with FTK</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (134 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated platform. Whether you are new to Computer Forensics or have some experience, this book will help you get started with FTK so you can analyze evidence effectively and efficiently. If you are a law enforcement official, corporate security, or IT professional who needs to evaluate the evidentiary value of digital evidence, then this book is ideal for you</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Carbone, Fernando</subfield><subfield code="t">Computer Forensics with FTK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029022426</subfield></datafield></record></collection> |
id | DE-604.BV043608367 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:51Z |
institution | BVB |
isbn | 9781783559039 9781783559022 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029022426 |
oclc_num | 973281621 |
open_access_boolean | |
physical | 1 online resource (134 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing |
record_format | marc |
spelling | Carbone, Fernando Verfasser aut Computer Forensics with FTK Birmingham Packt Publishing 2014 © 2014 1 online resource (134 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated platform. Whether you are new to Computer Forensics or have some experience, this book will help you get started with FTK so you can analyze evidence effectively and efficiently. If you are a law enforcement official, corporate security, or IT professional who needs to evaluate the evidentiary value of digital evidence, then this book is ideal for you Computer networks -- Security measures Computer security Forensic sciences Erscheint auch als Druck-Ausgabe Carbone, Fernando Computer Forensics with FTK |
spellingShingle | Carbone, Fernando Computer Forensics with FTK Computer networks -- Security measures Computer security Forensic sciences |
title | Computer Forensics with FTK |
title_auth | Computer Forensics with FTK |
title_exact_search | Computer Forensics with FTK |
title_full | Computer Forensics with FTK |
title_fullStr | Computer Forensics with FTK |
title_full_unstemmed | Computer Forensics with FTK |
title_short | Computer Forensics with FTK |
title_sort | computer forensics with ftk |
topic | Computer networks -- Security measures Computer security Forensic sciences |
topic_facet | Computer networks -- Security measures Computer security Forensic sciences |
work_keys_str_mv | AT carbonefernando computerforensicswithftk |