Digital forensics basics: (Record no. 3872)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01726nam a22002057a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20221122123457.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 221122b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781484267332 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.25968 |
Item number | HAS |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Hassan, Nihad A. |
245 ## - TITLE STATEMENT | |
Title | Digital forensics basics: |
Remainder of title | a practical guide using windows OS |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc. | Apress |
Place of publication, distribution, etc. | New York |
Date of publication, distribution, etc. | 2021 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxii, 335 p. |
365 ## - TRADE PRICE | |
Price type code | INR |
Price amount | 1249.00 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | About this book<br/>Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law.<br/><br/>Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use.<br/><br/>Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Digital forensic science |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes--Investigation |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Bill No | Bill Date | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Accession Number | Date last seen | Copy number | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | IT & Decisions Sciences | TB1974 | 28-10-2022 | Indian Institute of Management LRC | Indian Institute of Management LRC | General Stacks | 11/22/2022 | Technical Bureau India Pvt. Ltd. | 874.30 | 363.25968 HAS | 003714 | 11/22/2022 | 1 | 1249.00 | 11/22/2022 | Book |