Computer forensics with FTK: = Computer forensics with forensic toolkit
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, U.K.
Packt Pub.
2014
|
Schlagworte: | |
Beschreibung: | Includes index Print version record |
Beschreibung: | 1 online resource illustrations |
ISBN: | 9781783559039 1783559039 1306531136 9781306531139 1783559020 9781783559022 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350618 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781783559039 |9 978-1-78355-903-9 | ||
020 | |a 1783559039 |9 1-78355-903-9 | ||
020 | |a 1306531136 |9 1-306-53113-6 | ||
020 | |a 9781306531139 |9 978-1-306-53113-9 | ||
020 | |a 1783559020 |9 1-78355-902-0 | ||
020 | |a 9781783559022 |9 978-1-78355-902-2 | ||
035 | |a (ZDB-4-ITC)ocn874967581 | ||
035 | |a (OCoLC)874967581 | ||
035 | |a (DE-599)BVBBV045350618 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Carbone, Fernando |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer forensics with FTK |b = Computer forensics with forensic toolkit |c Fernando Carbone |
246 | 1 | 3 | |a Computer forensics with forensic toolkit |
246 | 1 | 1 | |a Computer forensics with forensic toolkit |
264 | 1 | |a Birmingham, U.K. |b Packt Pub. |c 2014 | |
300 | |a 1 online resource |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Print version record | ||
505 | 8 | |a With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry out these activities. The FTK platform, with the ability to collect and analyze digital evidence quickly and with integrity, is a great solution to help professionals achieve these goals. It is extremely useful for conducting digital investigations, helping you conduct a thorough investigation through a single tool and ensure the integrity of evidence. It is hard to find technical information on this tool and that's where this book will come in handy, helping professionals perform their activities with greater excellence. --from publisher description | |
546 | |a English | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / International Security |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Forensic sciences |2 fast | |
650 | 7 | |a Electrical & Computer Engineering |2 hilcc | |
650 | 7 | |a Engineering & Applied Sciences |2 hilcc | |
650 | 7 | |a Telecommunications |2 hilcc | |
650 | 4 | |a Computer networks |x Security measures |a Computer security |a Forensic sciences | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Carbone, Fernando |t Computer forensics with FTK. |d Packt Publishing 2014 |z 9781783559022 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030737272 |
Datensatz im Suchindex
_version_ | 1804179175383236608 |
---|---|
any_adam_object | |
author | Carbone, Fernando |
author_facet | Carbone, Fernando |
author_role | aut |
author_sort | Carbone, Fernando |
author_variant | f c fc |
building | Verbundindex |
bvnumber | BV045350618 |
collection | ZDB-4-ITC |
contents | With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry out these activities. The FTK platform, with the ability to collect and analyze digital evidence quickly and with integrity, is a great solution to help professionals achieve these goals. It is extremely useful for conducting digital investigations, helping you conduct a thorough investigation through a single tool and ensure the integrity of evidence. It is hard to find technical information on this tool and that's where this book will come in handy, helping professionals perform their activities with greater excellence. --from publisher description |
ctrlnum | (ZDB-4-ITC)ocn874967581 (OCoLC)874967581 (DE-599)BVBBV045350618 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02810nmm a2200553zc 4500</leader><controlfield tag="001">BV045350618</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783559039</subfield><subfield code="9">978-1-78355-903-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783559039</subfield><subfield code="9">1-78355-903-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306531136</subfield><subfield code="9">1-306-53113-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306531139</subfield><subfield code="9">978-1-306-53113-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783559020</subfield><subfield code="9">1-78355-902-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783559022</subfield><subfield code="9">978-1-78355-902-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn874967581</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874967581</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350618</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carbone, Fernando</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer forensics with FTK</subfield><subfield code="b">= Computer forensics with forensic toolkit</subfield><subfield code="c">Fernando Carbone</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Computer forensics with forensic toolkit</subfield></datafield><datafield tag="246" ind1="1" ind2="1"><subfield code="a">Computer forensics with forensic toolkit</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, U.K.</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry out these activities. The FTK platform, with the ability to collect and analyze digital evidence quickly and with integrity, is a great solution to help professionals achieve these goals. It is extremely useful for conducting digital investigations, helping you conduct a thorough investigation through a single tool and ensure the integrity of evidence. It is hard to find technical information on this tool and that's where this book will come in handy, helping professionals perform their activities with greater excellence. --from publisher description</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / International Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Forensic sciences</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electrical & Computer Engineering</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Engineering & Applied Sciences</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunications</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer security</subfield><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Carbone, Fernando</subfield><subfield code="t">Computer forensics with FTK.</subfield><subfield code="d">Packt Publishing 2014</subfield><subfield code="z">9781783559022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030737272</subfield></datafield></record></collection> |
id | DE-604.BV045350618 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:41Z |
institution | BVB |
isbn | 9781783559039 1783559039 1306531136 9781306531139 1783559020 9781783559022 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030737272 |
oclc_num | 874967581 |
open_access_boolean | |
physical | 1 online resource illustrations |
psigel | ZDB-4-ITC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Pub. |
record_format | marc |
spelling | Carbone, Fernando Verfasser aut Computer forensics with FTK = Computer forensics with forensic toolkit Fernando Carbone Computer forensics with forensic toolkit Birmingham, U.K. Packt Pub. 2014 1 online resource illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Print version record With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry out these activities. The FTK platform, with the ability to collect and analyze digital evidence quickly and with integrity, is a great solution to help professionals achieve these goals. It is extremely useful for conducting digital investigations, helping you conduct a thorough investigation through a single tool and ensure the integrity of evidence. It is hard to find technical information on this tool and that's where this book will come in handy, helping professionals perform their activities with greater excellence. --from publisher description English COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh Computer networks / Security measures fast Computer security fast Forensic sciences fast Electrical & Computer Engineering hilcc Engineering & Applied Sciences hilcc Telecommunications hilcc Computer networks Security measures Computer security Forensic sciences Erscheint auch als Druck-Ausgabe Carbone, Fernando Computer forensics with FTK. Packt Publishing 2014 9781783559022 |
spellingShingle | Carbone, Fernando Computer forensics with FTK = Computer forensics with forensic toolkit With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry out these activities. The FTK platform, with the ability to collect and analyze digital evidence quickly and with integrity, is a great solution to help professionals achieve these goals. It is extremely useful for conducting digital investigations, helping you conduct a thorough investigation through a single tool and ensure the integrity of evidence. It is hard to find technical information on this tool and that's where this book will come in handy, helping professionals perform their activities with greater excellence. --from publisher description COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh Computer networks / Security measures fast Computer security fast Forensic sciences fast Electrical & Computer Engineering hilcc Engineering & Applied Sciences hilcc Telecommunications hilcc Computer networks Security measures Computer security Forensic sciences |
title | Computer forensics with FTK = Computer forensics with forensic toolkit |
title_alt | Computer forensics with forensic toolkit |
title_auth | Computer forensics with FTK = Computer forensics with forensic toolkit |
title_exact_search | Computer forensics with FTK = Computer forensics with forensic toolkit |
title_full | Computer forensics with FTK = Computer forensics with forensic toolkit Fernando Carbone |
title_fullStr | Computer forensics with FTK = Computer forensics with forensic toolkit Fernando Carbone |
title_full_unstemmed | Computer forensics with FTK = Computer forensics with forensic toolkit Fernando Carbone |
title_short | Computer forensics with FTK |
title_sort | computer forensics with ftk computer forensics with forensic toolkit |
title_sub | = Computer forensics with forensic toolkit |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh Computer networks / Security measures fast Computer security fast Forensic sciences fast Electrical & Computer Engineering hilcc Engineering & Applied Sciences hilcc Telecommunications hilcc Computer networks Security measures Computer security Forensic sciences |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General POLITICAL SCIENCE / Political Freedom & Security / International Security Computer networks / Security measures Computer security Forensic sciences Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Computer networks Security measures Computer security Forensic sciences |
work_keys_str_mv | AT carbonefernando computerforensicswithftkcomputerforensicswithforensictoolkit AT carbonefernando computerforensicswithforensictoolkit |