Techno security's guide to e-discovery and digital forensics /:
This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preser...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA :
Syngress Pub.,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book. |
Beschreibung: | 1 online resource (xxvi, 405 pages :) |
ISBN: | 9781597492232 159749223X 9780080558813 008055881X |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn228148148 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 080516s2007 maua o 001 0 eng d | ||
010 | |a 2008270309 | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCQ |d N$T |d IDEBK |d E7B |d UMI |d DEBSZ |d OCLCQ |d YDXCP |d OCLCQ |d OCLCF |d NLE |d OCLCQ |d COO |d OCLCQ |d AZK |d LOA |d JBG |d AGLDB |d Z5A |d MOR |d PIFAG |d OCLCQ |d U3W |d OCLCA |d COCUF |d STF |d VNS |d WRM |d D6H |d OCLCQ |d VTS |d CEF |d NRAMU |d INT |d VT2 |d OCLCQ |d WYU |d OCLCQ |d LEAUB |d UKCRE |d BOL |d OCLCQ |d OCLCO |d M8D |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d EZC |d INARC | ||
019 | |a 299036116 |a 646767416 |a 712980294 |a 824140482 |a 859882106 |a 961641098 |a 962621151 |a 966185778 |a 988405124 |a 992102193 |a 1034926965 |a 1037901754 |a 1038582304 |a 1045483085 |a 1055407818 |a 1065077862 |a 1081231967 |a 1114439666 |a 1153476413 |a 1156405337 |a 1192349618 |a 1202541342 |a 1228534027 | ||
020 | |a 9781597492232 | ||
020 | |a 159749223X | ||
020 | |a 9780080558813 |q (electronic bk.) | ||
020 | |a 008055881X |q (electronic bk.) | ||
035 | |a (OCoLC)228148148 |z (OCoLC)299036116 |z (OCoLC)646767416 |z (OCoLC)712980294 |z (OCoLC)824140482 |z (OCoLC)859882106 |z (OCoLC)961641098 |z (OCoLC)962621151 |z (OCoLC)966185778 |z (OCoLC)988405124 |z (OCoLC)992102193 |z (OCoLC)1034926965 |z (OCoLC)1037901754 |z (OCoLC)1038582304 |z (OCoLC)1045483085 |z (OCoLC)1055407818 |z (OCoLC)1065077862 |z (OCoLC)1081231967 |z (OCoLC)1114439666 |z (OCoLC)1153476413 |z (OCoLC)1156405337 |z (OCoLC)1192349618 |z (OCoLC)1202541342 |z (OCoLC)1228534027 | ||
037 | |a 148816:148965 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a HV8079.C65 |b W53 2007eb | |
072 | 7 | |a LAW |x 041000 |2 bisacsh | |
082 | 7 | |a 363.25/968 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Techno security's guide to e-discovery and digital forensics / |c Jack Wiles [and others]. |
260 | |a Burlington, MA : |b Syngress Pub., |c ©2007. | ||
300 | |a 1 online resource (xxvi, 405 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a text file |2 rdaft |0 http://rdaregistry.info/termList/fileType/1002 | ||
520 | |a This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book. | ||
505 | 0 | |a Introduction; Authentication; Email Forensics -- Developing an Enterprise Digital Investigative/Electronic Discovery Capability; Advanced Training For Your Electronic Discovery Team; Digital Forensics in a Multi Operating System Environment; Digital Forensic Investigation Operations; Working Together To Build a Regional Forensics Lab; Forensic Examinations in a Terabyte World; Starting a Career In The Field of Techno Forensics -- Degrees, Certifications and Networking; Standards in Digital Forensics; Selecting The Hardware For Your Forensics Computer; Death By a Thousand Cuts; Balancing Records & Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to Presenting The Best You; Mac Forensics. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer crimes |x Investigation. |0 http://id.loc.gov/authorities/subjects/sh85029493 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Criminalité informatique |x Enquêtes. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a LAW |x Forensic Science. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
655 | 7 | |a dissertations. |2 aat | |
655 | 7 | |a Academic theses |2 fast | |
655 | 7 | |a Academic theses. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026039 | |
655 | 7 | |a Thèses et écrits académiques. |2 rvmgf | |
700 | 1 | |a Wiles, Jack. |0 http://id.loc.gov/authorities/names/no2008058525 | |
758 | |i has work: |a Techno security's guide to e-discovery and digital forensics (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFPGwfqqDdMPxCHMxvdwyd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Techno security's guide to e-discovery and digital forensics. |d Burlington, MA : Syngress Pub., ©2007 |z 9781597492232 |z 159749223X |w (DLC) 2008270309 |w (OCoLC)166379655 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597492232 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597492232 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=239209 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=239209 |3 Volltext | |
938 | |a ebrary |b EBRY |n ebr10254665 | ||
938 | |a EBSCOhost |b EBSC |n 239209 | ||
938 | |a YBP Library Services |b YANK |n 2907501 | ||
938 | |a Internet Archive |b INAR |n isbn_9781597492232 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn228148148 |
---|---|
_version_ | 1813903316509261824 |
adam_text | |
any_adam_object | |
author2 | Wiles, Jack |
author2_role | |
author2_variant | j w jw |
author_GND | http://id.loc.gov/authorities/names/no2008058525 |
author_facet | Wiles, Jack |
author_sort | Wiles, Jack |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 W53 2007eb |
callnumber-search | HV8079.C65 W53 2007eb |
callnumber-sort | HV 48079 C65 W53 42007EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Introduction; Authentication; Email Forensics -- Developing an Enterprise Digital Investigative/Electronic Discovery Capability; Advanced Training For Your Electronic Discovery Team; Digital Forensics in a Multi Operating System Environment; Digital Forensic Investigation Operations; Working Together To Build a Regional Forensics Lab; Forensic Examinations in a Terabyte World; Starting a Career In The Field of Techno Forensics -- Degrees, Certifications and Networking; Standards in Digital Forensics; Selecting The Hardware For Your Forensics Computer; Death By a Thousand Cuts; Balancing Records & Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to Presenting The Best You; Mac Forensics. |
ctrlnum | (OCoLC)228148148 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05949cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn228148148</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">080516s2007 maua o 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2008270309</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">Z5A</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">COCUF</subfield><subfield code="d">STF</subfield><subfield code="d">VNS</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BOL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">EZC</subfield><subfield code="d">INARC</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">299036116</subfield><subfield code="a">646767416</subfield><subfield code="a">712980294</subfield><subfield code="a">824140482</subfield><subfield code="a">859882106</subfield><subfield code="a">961641098</subfield><subfield code="a">962621151</subfield><subfield code="a">966185778</subfield><subfield code="a">988405124</subfield><subfield code="a">992102193</subfield><subfield code="a">1034926965</subfield><subfield code="a">1037901754</subfield><subfield code="a">1038582304</subfield><subfield code="a">1045483085</subfield><subfield code="a">1055407818</subfield><subfield code="a">1065077862</subfield><subfield code="a">1081231967</subfield><subfield code="a">1114439666</subfield><subfield code="a">1153476413</subfield><subfield code="a">1156405337</subfield><subfield code="a">1192349618</subfield><subfield code="a">1202541342</subfield><subfield code="a">1228534027</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492232</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749223X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558813</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008055881X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228148148</subfield><subfield code="z">(OCoLC)299036116</subfield><subfield code="z">(OCoLC)646767416</subfield><subfield code="z">(OCoLC)712980294</subfield><subfield code="z">(OCoLC)824140482</subfield><subfield code="z">(OCoLC)859882106</subfield><subfield code="z">(OCoLC)961641098</subfield><subfield code="z">(OCoLC)962621151</subfield><subfield code="z">(OCoLC)966185778</subfield><subfield code="z">(OCoLC)988405124</subfield><subfield code="z">(OCoLC)992102193</subfield><subfield code="z">(OCoLC)1034926965</subfield><subfield code="z">(OCoLC)1037901754</subfield><subfield code="z">(OCoLC)1038582304</subfield><subfield code="z">(OCoLC)1045483085</subfield><subfield code="z">(OCoLC)1055407818</subfield><subfield code="z">(OCoLC)1065077862</subfield><subfield code="z">(OCoLC)1081231967</subfield><subfield code="z">(OCoLC)1114439666</subfield><subfield code="z">(OCoLC)1153476413</subfield><subfield code="z">(OCoLC)1156405337</subfield><subfield code="z">(OCoLC)1192349618</subfield><subfield code="z">(OCoLC)1202541342</subfield><subfield code="z">(OCoLC)1228534027</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">148816:148965</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">W53 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">041000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Techno security's guide to e-discovery and digital forensics /</subfield><subfield code="c">Jack Wiles [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 405 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="g">polychrome.</subfield><subfield code="2">rdacc</subfield><subfield code="0">http://rdaregistry.info/termList/RDAColourContent/1003</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rdaft</subfield><subfield code="0">http://rdaregistry.info/termList/fileType/1002</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction; Authentication; Email Forensics -- Developing an Enterprise Digital Investigative/Electronic Discovery Capability; Advanced Training For Your Electronic Discovery Team; Digital Forensics in a Multi Operating System Environment; Digital Forensic Investigation Operations; Working Together To Build a Regional Forensics Lab; Forensic Examinations in a Terabyte World; Starting a Career In The Field of Techno Forensics -- Degrees, Certifications and Networking; Standards in Digital Forensics; Selecting The Hardware For Your Forensics Computer; Death By a Thousand Cuts; Balancing Records & Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to Presenting The Best You; Mac Forensics.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029493</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Enquêtes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Forensic Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">dissertations.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026039</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Thèses et écrits académiques.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wiles, Jack.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008058525</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Techno security's guide to e-discovery and digital forensics (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFPGwfqqDdMPxCHMxvdwyd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Techno security's guide to e-discovery and digital forensics.</subfield><subfield code="d">Burlington, MA : Syngress Pub., ©2007</subfield><subfield code="z">9781597492232</subfield><subfield code="z">159749223X</subfield><subfield code="w">(DLC) 2008270309</subfield><subfield code="w">(OCoLC)166379655</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597492232</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597492232</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=239209</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=239209</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10254665</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">239209</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2907501</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">isbn_9781597492232</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
genre | dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf |
genre_facet | dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
id | ZDB-4-EBA-ocn228148148 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:16:45Z |
institution | BVB |
isbn | 9781597492232 159749223X 9780080558813 008055881X |
language | English |
lccn | 2008270309 |
oclc_num | 228148148 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xxvi, 405 pages :) |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Techno security's guide to e-discovery and digital forensics / Jack Wiles [and others]. Burlington, MA : Syngress Pub., ©2007. 1 online resource (xxvi, 405 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 text file rdaft http://rdaregistry.info/termList/fileType/1002 This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book. Introduction; Authentication; Email Forensics -- Developing an Enterprise Digital Investigative/Electronic Discovery Capability; Advanced Training For Your Electronic Discovery Team; Digital Forensics in a Multi Operating System Environment; Digital Forensic Investigation Operations; Working Together To Build a Regional Forensics Lab; Forensic Examinations in a Terabyte World; Starting a Career In The Field of Techno Forensics -- Degrees, Certifications and Networking; Standards in Digital Forensics; Selecting The Hardware For Your Forensics Computer; Death By a Thousand Cuts; Balancing Records & Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to Presenting The Best You; Mac Forensics. Print version record. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Criminalité informatique Enquêtes. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. LAW Forensic Science. bisacsh Computer crimes Investigation fast Computer networks Security measures fast Computer security fast dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf Wiles, Jack. http://id.loc.gov/authorities/names/no2008058525 has work: Techno security's guide to e-discovery and digital forensics (Text) https://id.oclc.org/worldcat/entity/E39PCFPGwfqqDdMPxCHMxvdwyd https://id.oclc.org/worldcat/ontology/hasWork Print version: Techno security's guide to e-discovery and digital forensics. Burlington, MA : Syngress Pub., ©2007 9781597492232 159749223X (DLC) 2008270309 (OCoLC)166379655 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597492232 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597492232 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=239209 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=239209 Volltext |
spellingShingle | Techno security's guide to e-discovery and digital forensics / Introduction; Authentication; Email Forensics -- Developing an Enterprise Digital Investigative/Electronic Discovery Capability; Advanced Training For Your Electronic Discovery Team; Digital Forensics in a Multi Operating System Environment; Digital Forensic Investigation Operations; Working Together To Build a Regional Forensics Lab; Forensic Examinations in a Terabyte World; Starting a Career In The Field of Techno Forensics -- Degrees, Certifications and Networking; Standards in Digital Forensics; Selecting The Hardware For Your Forensics Computer; Death By a Thousand Cuts; Balancing Records & Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to Presenting The Best You; Mac Forensics. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Criminalité informatique Enquêtes. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. LAW Forensic Science. bisacsh Computer crimes Investigation fast Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029493 http://id.loc.gov/authorities/subjects/sh94001277 https://id.nlm.nih.gov/mesh/D016494 http://id.loc.gov/authorities/genreForms/gf2014026039 |
title | Techno security's guide to e-discovery and digital forensics / |
title_auth | Techno security's guide to e-discovery and digital forensics / |
title_exact_search | Techno security's guide to e-discovery and digital forensics / |
title_full | Techno security's guide to e-discovery and digital forensics / Jack Wiles [and others]. |
title_fullStr | Techno security's guide to e-discovery and digital forensics / Jack Wiles [and others]. |
title_full_unstemmed | Techno security's guide to e-discovery and digital forensics / Jack Wiles [and others]. |
title_short | Techno security's guide to e-discovery and digital forensics / |
title_sort | techno security s guide to e discovery and digital forensics |
topic | Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Criminalité informatique Enquêtes. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. LAW Forensic Science. bisacsh Computer crimes Investigation fast Computer networks Security measures fast Computer security fast |
topic_facet | Computer crimes Investigation. Computer networks Security measures. Computer security. Computer Security Criminalité informatique Enquêtes. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. LAW Forensic Science. Computer crimes Investigation Computer networks Security measures Computer security dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
url | https://www.sciencedirect.com/science/book/9781597492232 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=239209 |
work_keys_str_mv | AT wilesjack technosecuritysguidetoediscoveryanddigitalforensics |