It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:169420600:2978
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:169420600:2978?format=raw

LEADER: 02978cam a2200409Ia 4500
001 014124791-6
005 20140725095148.0
008 030808s2002 maua b 001 0 eng d
010 $a 00103410
020 $a0201707195 (pbk.)
020 $a9780201707199 (pbk.)
035 0 $aocm52815421
040 $aLSH$beng$cLSH$dIAY$dNRM$dCNCGM$dDEBBG$dOCLCF$dOCLCO
050 00 $aQA76.9.A25$bK78 2002
082 00 $a005.8$221
084 $aDAT 050f$2stub
084 $aDAT 460f$2stub
084 $aST 277$2rvk
100 1 $aKruse, Warren G.
245 10 $aComputer forensics :$bincident response essentials /$cWarren G. Kruse II, Jay G. Heiser.
260 $aBoston, Mass. :$bAddison-Wesley :$bLucent Technologies,$cc2002.
300 $axiii, 392 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references (p. 381-384) and index.
505 0 $aCh. 1. Introduction to Computer Forensics -- Ch. 2. Tracking an Offender -- Ch. 3. The Basics of Hard Drives and Storage Media -- Ch. 4. Encryption and Forensics -- Ch. 5. Data Hiding -- Ch. 6. Hostile Code -- Ch. 7. Your Electronic Toolkit -- Ch. 8. Investigating Windows Computers -- Ch. 9. Introduction to Unix for Forensic Examiners -- Ch. 10. Compromising a Unix Host -- Ch. 11. Investigating a Unix Host -- Ch. 12. Introduction to the Criminal Justice System -- Ch. 13. Conclusion -- App. A. Internet Data Center Response Plan -- App. B. Incident Response Triage Questionnaire -- App. C. How to Become a Unix Guru -- App. D. Exporting a Windows 2000 Personal Certificate -- App. E. How to Crowbar Unix Hosts -- App. F. Creating a Linux Boot CD -- App. G. Contents of a Forensic CD.
520 1 $a"Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered." "Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography."--BOOK JACKET.
650 0 $aComputer security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aForensic sciences.
650 07 $aComputerkriminalität.$2swd
650 07 $aComputersicherheit.$2swd
650 07 $aRechnernetz.$2swd
650 7 $aComputer networks$xSecurity measures.$2fast
650 7 $aComputer security.$2fast
650 7 $aForensic sciences.$2fast
700 1 $aHeiser, Jay G.
988 $a20140725
906 $0OCLC