Learn computer forensics :: a beginner's guide to searching, analyzing, and securing digital evidence /
Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and beco...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator. |
Beschreibung: | 1 online resource (xi, 350 pages) ; illustrations (color) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781838641092 1838641092 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1153810912 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m d | ||
007 | cr ||||||||||| | ||
008 | 200509s2020 enka o 001 0 eng d | ||
040 | |a EBLCP |b eng |e rda |c EBLCP |d YDXIT |d OCLCO |d YDX |d N$T |d OCLCF |d UKAHL |d UKMGB |d UMI |d TXM |d OCLCO |d OCLCQ |d CHK |d OCLCO |d OCLCQ | ||
015 | |a GBC070763 |2 bnb | ||
016 | 7 | |a 019788639 |2 Uk | |
019 | |a 1153452643 |a 1197974464 | ||
020 | |a 9781838641092 |q electronic book | ||
020 | |a 1838641092 |q electronic book | ||
020 | |z 9781838648176 | ||
035 | |a (OCoLC)1153810912 |z (OCoLC)1153452643 |z (OCoLC)1197974464 | ||
037 | |a 9781838641092 |b Packt Publishing | ||
050 | 4 | |a HV8079.C65 |b O48 2020 | |
082 | 7 | |a 363.25968 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Oettinger, William, |e author. | |
245 | 1 | 0 | |a Learn computer forensics : |b a beginner's guide to searching, analyzing, and securing digital evidence / |c William Oettinger. |
264 | 1 | |a Birmingham : |b Packt Publishing, Limited, |c [2020] | |
300 | |a 1 online resource (xi, 350 pages) ; |b illustrations (color) | ||
336 | |a text |b txt |2 rdacontent | ||
336 | |a still image |b sti |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator. | ||
588 | |a Description based on online resource; title from digital title page (viewed on May 20, 2020). | ||
505 | 0 | |a Types of Computer-Based Investigations -- The Forensic Analysis Process -- Acquisition of Evidence -- Computer Systems -- Computer Investigation Process -- Windows Artifact Analysis -- RAM Memory Forensic Analysis -- Email Forensics: Investigation Techniques -- Internet Artifacts -- Report Writing -- Expert Witness Ethics. | |
650 | 0 | |a Computer crimes |x Investigation. |0 http://id.loc.gov/authorities/subjects/sh85029493 | |
650 | 0 | |a Criminal investigation. |0 http://id.loc.gov/authorities/subjects/sh85034045 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Electronic evidence. |0 http://id.loc.gov/authorities/subjects/sh2008008558 | |
650 | 0 | |a Hackers. |0 http://id.loc.gov/authorities/subjects/sh94005931 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Criminalité informatique |x Enquêtes. | |
650 | 6 | |a Enquêtes criminelles. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Preuve électronique. | |
650 | 6 | |a Pirates informatiques. | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Criminal investigation |2 fast | |
650 | 7 | |a Electronic evidence |2 fast | |
650 | 7 | |a Hackers |2 fast | |
776 | 0 | 8 | |i Print version: |a Learn Computer Forensics |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463658 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463658 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH37379794 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6190693 | ||
938 | |a YBP Library Services |b YANK |n 301258988 | ||
938 | |a EBSCOhost |b EBSC |n 2463658 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1153810912 |
---|---|
_version_ | 1826942312837545984 |
adam_text | |
any_adam_object | |
author | Oettinger, William |
author_facet | Oettinger, William |
author_role | aut |
author_sort | Oettinger, William |
author_variant | w o wo |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 O48 2020 |
callnumber-search | HV8079.C65 O48 2020 |
callnumber-sort | HV 48079 C65 O48 42020 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Types of Computer-Based Investigations -- The Forensic Analysis Process -- Acquisition of Evidence -- Computer Systems -- Computer Investigation Process -- Windows Artifact Analysis -- RAM Memory Forensic Analysis -- Email Forensics: Investigation Techniques -- Internet Artifacts -- Report Writing -- Expert Witness Ethics. |
ctrlnum | (OCoLC)1153810912 |
dewey-full | 363.25968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25968 |
dewey-search | 363.25968 |
dewey-sort | 3363.25968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03480cam a2200661 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1153810912</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">200509s2020 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">EBLCP</subfield><subfield code="d">YDXIT</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">UKMGB</subfield><subfield code="d">UMI</subfield><subfield code="d">TXM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CHK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC070763</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019788639</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1153452643</subfield><subfield code="a">1197974464</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838641092</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838641092</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838648176</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1153810912</subfield><subfield code="z">(OCoLC)1153452643</subfield><subfield code="z">(OCoLC)1197974464</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781838641092</subfield><subfield code="b">Packt Publishing</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">O48 2020</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25968</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oettinger, William,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learn computer forensics :</subfield><subfield code="b">a beginner's guide to searching, analyzing, and securing digital evidence /</subfield><subfield code="c">William Oettinger.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 350 pages) ;</subfield><subfield code="b">illustrations (color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">still image</subfield><subfield code="b">sti</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on May 20, 2020).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Types of Computer-Based Investigations -- The Forensic Analysis Process -- Acquisition of Evidence -- Computer Systems -- Computer Investigation Process -- Windows Artifact Analysis -- RAM Memory Forensic Analysis -- Email Forensics: Investigation Techniques -- Internet Artifacts -- Report Writing -- Expert Witness Ethics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029493</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034045</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic evidence.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2008008558</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94005931</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Enquêtes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Enquêtes criminelles.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Preuve électronique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic evidence</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Learn Computer Forensics</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463658</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463658</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37379794</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6190693</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301258988</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2463658</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1153810912 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:26:01Z |
institution | BVB |
isbn | 9781838641092 1838641092 |
language | English |
oclc_num | 1153810912 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xi, 350 pages) ; illustrations (color) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, Limited, |
record_format | marc |
spelling | Oettinger, William, author. Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / William Oettinger. Birmingham : Packt Publishing, Limited, [2020] 1 online resource (xi, 350 pages) ; illustrations (color) text txt rdacontent still image sti rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator. Description based on online resource; title from digital title page (viewed on May 20, 2020). Types of Computer-Based Investigations -- The Forensic Analysis Process -- Acquisition of Evidence -- Computer Systems -- Computer Investigation Process -- Windows Artifact Analysis -- RAM Memory Forensic Analysis -- Email Forensics: Investigation Techniques -- Internet Artifacts -- Report Writing -- Expert Witness Ethics. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Electronic evidence. http://id.loc.gov/authorities/subjects/sh2008008558 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer Security https://id.nlm.nih.gov/mesh/D016494 Criminalité informatique Enquêtes. Enquêtes criminelles. Sécurité informatique. Preuve électronique. Pirates informatiques. Computer crimes Investigation fast Computer security fast Criminal investigation fast Electronic evidence fast Hackers fast Print version: Learn Computer Forensics |
spellingShingle | Oettinger, William Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / Types of Computer-Based Investigations -- The Forensic Analysis Process -- Acquisition of Evidence -- Computer Systems -- Computer Investigation Process -- Windows Artifact Analysis -- RAM Memory Forensic Analysis -- Email Forensics: Investigation Techniques -- Internet Artifacts -- Report Writing -- Expert Witness Ethics. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Electronic evidence. http://id.loc.gov/authorities/subjects/sh2008008558 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer Security https://id.nlm.nih.gov/mesh/D016494 Criminalité informatique Enquêtes. Enquêtes criminelles. Sécurité informatique. Preuve électronique. Pirates informatiques. Computer crimes Investigation fast Computer security fast Criminal investigation fast Electronic evidence fast Hackers fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029493 http://id.loc.gov/authorities/subjects/sh85034045 http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh2008008558 http://id.loc.gov/authorities/subjects/sh94005931 https://id.nlm.nih.gov/mesh/D016494 |
title | Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / |
title_auth | Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / |
title_exact_search | Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / |
title_full | Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / William Oettinger. |
title_fullStr | Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / William Oettinger. |
title_full_unstemmed | Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / William Oettinger. |
title_short | Learn computer forensics : |
title_sort | learn computer forensics a beginner s guide to searching analyzing and securing digital evidence |
title_sub | a beginner's guide to searching, analyzing, and securing digital evidence / |
topic | Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Electronic evidence. http://id.loc.gov/authorities/subjects/sh2008008558 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer Security https://id.nlm.nih.gov/mesh/D016494 Criminalité informatique Enquêtes. Enquêtes criminelles. Sécurité informatique. Preuve électronique. Pirates informatiques. Computer crimes Investigation fast Computer security fast Criminal investigation fast Electronic evidence fast Hackers fast |
topic_facet | Computer crimes Investigation. Criminal investigation. Computer security. Electronic evidence. Hackers. Computer Security Criminalité informatique Enquêtes. Enquêtes criminelles. Sécurité informatique. Preuve électronique. Pirates informatiques. Computer crimes Investigation Computer security Criminal investigation Electronic evidence Hackers |
work_keys_str_mv | AT oettingerwilliam learncomputerforensicsabeginnersguidetosearchinganalyzingandsecuringdigitalevidence |