Cyber Forensics: (Record no. 40626)

MARC details
000 -LEADER
fixed length control field 03573nam a22003137a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231202131759.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231202b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367524241
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367524180
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003057888
041 ## - LANGUAGE CODE
Language English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 362.2502
Item number MAR
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Marcella, Albert J. (ed)
240 ## - UNIFORM TITLE
Uniform title <a href="Cyber Forensics: Examining Emerging and Hybrid Technologies">Cyber Forensics: Examining Emerging and Hybrid Technologies</a>
245 ## - TITLE STATEMENT
Title Cyber Forensics:
Remainder of title Examining Emerging and Hybrid Technologies /
Statement of responsibility, etc Albert J. Marcella.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Florida :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc 2022.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 363 p.:
Other physical details ill. ;
Dimensions 24 cm.
505 ## - FORMATTED CONTENTS NOTE
Contents Preface<br/><br/>Acknowledgements<br/><br/>Editor<br/><br/>Contributors<br/><br/>1 Cyber forensics: Compliance and auditing<br/><br/>DOUGLAS MENENDEZ<br/><br/>2 IoT and the role of cyber forensics<br/><br/>PATRICK WILDS<br/><br/>3 Cyber forensics: Examining commercial Unmanned Aircraft Systems (UASs) and Unmanned Aerial Vehicles (UAVs)<br/><br/>ALBERT J. MARCELLA<br/><br/>4 Cloud forensics<br/><br/>RONALD L. KRUTZ<br/><br/>5 Forensics of the digital social triangle with an emphasis on Deepfakes<br/><br/>JAMES CURTIS<br/><br/>6 Operational technology, industrial control systems, and cyber forensics<br/><br/>ALBERT J. MARCELLA<br/><br/>7 Cyber forensics and risk management<br/><br/>DOUGLAS MENENDEZ<br/><br/>8 Mobile device forensics: An introduction<br/><br/>ANDREW HRENAK<br/><br/>9 Forensic accounting and the use of E-discovery and cyber forensics<br/><br/>RICHARD DIPPEL<br/><br/>10 Cyber forensic tools and utilities<br/><br/>DOUGLAS MENENDEZ<br/><br/>Index
520 ## - SUMMARY, ETC.
Summary, etc Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations.<br/><br/>A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element cybersecurity
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element anti-forensics tools
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element hacktivists
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element forensics
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element cyber forensics
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element cloud computing
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Text Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Social Sciences 02/12/2023   362.2502 MAR 47802 02/12/2023 02/12/2023 Text Books

Powered by Koha