MARC details
000 -LEADER |
fixed length control field |
02186cam a2200349 i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190913164035.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
170512s2017 mau b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284121841 |
041 ## - LANGUAGE CODE |
Language |
English |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.259 |
Edition number |
23 |
Item number |
EAS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Easttom, Chuck, |
245 10 - TITLE STATEMENT |
Title |
System forensics, investigation, and response / |
Statement of responsibility, etc |
Chuck Easttom. |
250 ## - EDITION STATEMENT |
Edition statement |
Third Edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Burlington, MA : |
Name of publisher, distributor, etc |
Jones & Bartlett Learning ; |
Date of publication, distribution, etc |
2019 . |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 335 pages ; |
Dimensions |
23 cm . |
Other physical details |
ill., |
500 ## - GENERAL NOTE |
General note |
Revised edition of the author's System forensics, investigation, and response, c2014. |
500 ## - GENERAL NOTE |
General note |
Textbooks<br/>Electronic books |
505 0# - FORMATTED CONTENTS NOTE |
Title |
1: Introduction to forensics --<br/> |
-- |
2: Overview of computer crime --<br/> |
-- |
3: Forensic methods and labs --<br/> |
-- |
4: Technical overview: system forensics tools, techniques, and methods --<br/> |
-- |
5: Collecting, seizing, and protecting evidence --<br/> |
-- |
6: Understanding techniques for hiding and scrambling information --<br/> |
-- |
7: Recovering data --<br/> |
-- |
8: E-mail forensics --<br/> |
-- |
9: Windows forensics --<br/> |
-- |
10: Linux forensics --<br/> |
-- |
11: Macintosh forensics --<br/> |
-- |
12: Mobile forensics --<br/> |
-- |
13: Performing network analysis --<br/> |
-- |
14: Incident response and resources --<br/> |
-- |
15: Incident and intrusion response --<br/> |
-- |
16: Trends and future directions --<br/> |
-- |
17: System forensics resources. |
520 ## - SUMMARY, ETC. |
Summary, etc |
<br/>Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of system forensics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Computer crimes -- Investigation -- Textbooks. |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Computer crimes -- Investigation. |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
BUSINESS & ECONOMICS / Infrastructure |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
SOCIAL SCIENCE / General |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
100 1# - MAIN ENTRY--PERSONAL NAME |
Relator term |
author. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
General subdivision |
Investigation |
Form subdivision |
Textbooks. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |