TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preser...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Elsevier Science
2011
|
Schlagworte: | |
Zusammenfassung: | This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be 1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (434 pages) |
ISBN: | 9780080558813 9781597492232 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044049527 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2011 |||| o||u| ||||||eng d | ||
020 | |a 9780080558813 |9 978-0-08-055881-3 | ||
020 | |a 9781597492232 |c Print |9 978-1-59749-223-2 | ||
035 | |a (ZDB-30-PAD)EBC405426 | ||
035 | |a (ZDB-89-EBL)EBL405426 | ||
035 | |a (ZDB-38-EBR)ebr10254665 | ||
035 | |a (OCoLC)476222837 | ||
035 | |a (DE-599)BVBBV044049527 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.82 | |
100 | 1 | |a Wiles, Jack |e Verfasser |4 aut | |
245 | 1 | 0 | |a TechnoSecurity's Guide to E-Discovery and Digital Forensics |b A Comprehensive Handbook |
264 | 1 | |a Rockland, MA |b Elsevier Science |c 2011 | |
264 | 4 | |c © 2007 | |
300 | |a 1 online resource (434 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be 1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book | ||
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer crimes - Investigation | |
650 | 4 | |a Computer crimes --Investigation. Computer networks --Security measures. Computer security | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Computer networks - Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Wiles, Jack |t TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook |
912 | |a ZDB-30-PAD |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029456372 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177066081386496 |
---|---|
any_adam_object | |
author | Wiles, Jack |
author_facet | Wiles, Jack |
author_role | aut |
author_sort | Wiles, Jack |
author_variant | j w jw |
building | Verbundindex |
bvnumber | BV044049527 |
collection | ZDB-30-PAD ZDB-38-ESG |
ctrlnum | (ZDB-30-PAD)EBC405426 (ZDB-89-EBL)EBL405426 (ZDB-38-EBR)ebr10254665 (OCoLC)476222837 (DE-599)BVBBV044049527 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03186nmm a2200529zc 4500</leader><controlfield tag="001">BV044049527</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558813</subfield><subfield code="9">978-0-08-055881-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492232</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-59749-223-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC405426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL405426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10254665</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)476222837</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044049527</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wiles, Jack</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">TechnoSecurity's Guide to E-Discovery and Digital Forensics</subfield><subfield code="b">A Comprehensive Handbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2011</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (434 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be 1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes - Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes --Investigation. Computer networks --Security measures. Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks - Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Wiles, Jack</subfield><subfield code="t">TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029456372</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044049527 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:42:10Z |
institution | BVB |
isbn | 9780080558813 9781597492232 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029456372 |
oclc_num | 476222837 |
open_access_boolean | |
physical | 1 online resource (434 pages) |
psigel | ZDB-30-PAD ZDB-38-ESG |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Elsevier Science |
record_format | marc |
spelling | Wiles, Jack Verfasser aut TechnoSecurity's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook Rockland, MA Elsevier Science 2011 © 2007 1 online resource (434 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be 1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book Computer crimes Computer crimes - Investigation Computer crimes --Investigation. Computer networks --Security measures. Computer security Computer networks Computer networks - Security measures Computer security Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s 1\p DE-604 Datensicherung (DE-588)4011144-1 s 2\p DE-604 Erscheint auch als Druck-Ausgabe Wiles, Jack TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wiles, Jack TechnoSecurity's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook Computer crimes Computer crimes - Investigation Computer crimes --Investigation. Computer networks --Security measures. Computer security Computer networks Computer networks - Security measures Computer security Computerkriminalität (DE-588)4010452-7 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4010452-7 (DE-588)4011144-1 |
title | TechnoSecurity's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook |
title_auth | TechnoSecurity's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook |
title_exact_search | TechnoSecurity's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook |
title_full | TechnoSecurity's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook |
title_fullStr | TechnoSecurity's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook |
title_full_unstemmed | TechnoSecurity's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook |
title_short | TechnoSecurity's Guide to E-Discovery and Digital Forensics |
title_sort | technosecurity s guide to e discovery and digital forensics a comprehensive handbook |
title_sub | A Comprehensive Handbook |
topic | Computer crimes Computer crimes - Investigation Computer crimes --Investigation. Computer networks --Security measures. Computer security Computer networks Computer networks - Security measures Computer security Computerkriminalität (DE-588)4010452-7 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer crimes Computer crimes - Investigation Computer crimes --Investigation. Computer networks --Security measures. Computer security Computer networks Computer networks - Security measures Computer security Computerkriminalität Datensicherung |
work_keys_str_mv | AT wilesjack technosecuritysguidetoediscoveryanddigitalforensicsacomprehensivehandbook |