System forensics, investigation, and response / (Record no. 30904)

MARC details
000 -LEADER
fixed length control field 02186cam a2200349 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190913164035.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170512s2017 mau b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284121841
041 ## - LANGUAGE CODE
Language English
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.259
Edition number 23
Item number EAS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Easttom, Chuck,
245 10 - TITLE STATEMENT
Title System forensics, investigation, and response /
Statement of responsibility, etc Chuck Easttom.
250 ## - EDITION STATEMENT
Edition statement Third Edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington, MA :
Name of publisher, distributor, etc Jones & Bartlett Learning ;
Date of publication, distribution, etc 2019 .
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 335 pages ;
Dimensions 23 cm .
Other physical details ill.,
500 ## - GENERAL NOTE
General note Revised edition of the author's System forensics, investigation, and response, c2014.
500 ## - GENERAL NOTE
General note Textbooks<br/>Electronic books
505 0# - FORMATTED CONTENTS NOTE
Title 1: Introduction to forensics --<br/>
-- 2: Overview of computer crime --<br/>
-- 3: Forensic methods and labs --<br/>
-- 4: Technical overview: system forensics tools, techniques, and methods --<br/>
-- 5: Collecting, seizing, and protecting evidence --<br/>
-- 6: Understanding techniques for hiding and scrambling information --<br/>
-- 7: Recovering data --<br/>
-- 8: E-mail forensics --<br/>
-- 9: Windows forensics --<br/>
-- 10: Linux forensics --<br/>
-- 11: Macintosh forensics --<br/>
-- 12: Mobile forensics --<br/>
-- 13: Performing network analysis --<br/>
-- 14: Incident response and resources --<br/>
-- 15: Incident and intrusion response --<br/>
-- 16: Trends and future directions --<br/>
-- 17: System forensics resources.
520 ## - SUMMARY, ETC.
Summary, etc <br/>Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of system forensics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Computer crimes -- Investigation -- Textbooks.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Computer crimes -- Investigation.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name BUSINESS & ECONOMICS / Infrastructure
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name SOCIAL SCIENCE / General
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
100 1# - MAIN ENTRY--PERSONAL NAME
Relator term author.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Investigation
Form subdivision Textbooks.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Social Sciences 13/09/2019   363.259 EAS 37343 13/09/2019 13/09/2019 General Books

Powered by Koha