It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 01989cam a22003614a 4500
001 2006005530
003 DLC
005 20070822093028.0
008 060216s2006 inua b 001 0 eng
010 $a 2006005530
020 $a0470038624 (pbk.)
020 $a9780470038628
035 $a(OCoLC)ocm64390409
035 $a(OCoLC)64390409
040 $aDLC$cDLC$dBAKER$dC#P$dYDXCP$dOCLCQ$dBTCTA$dDLC
042 $apcc
043 $an-us---
050 00 $aHV8079.C65$bS84 2006
082 00 $a363.25/968$222
100 1 $aSteel, Chad,$d1975-
245 10 $aWindows forensics :$bthe field guide for conducting corporate computer investigations /$cChad Steel.
260 $aIndianapolis, IN :$bWiley Pub.,$cc2006.
300 $axvii, 382 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aWindows forensics -- Processing the digital crime scene -- Windows forensics basics -- Partitions and file systems -- Directory structure and special files -- The registry -- Forensic analysis -- Live system analysis -- Forensic duplication -- File system analysis -- Log file analysis -- Internet usage analysis -- Email investigations -- App. A. Sample chain of custody form -- App. B. Master boot record layout -- App. C. Partition types -- App. D. Fat32 boot sector layout -- App. E. NTFS boot sector layout -- App. F. NTFS metafiles -- App. G. Well-known SIDs -- Index.
650 0 $aComputer crimes$xInvestigation$zUnited States$xMethodology.
630 00 $aMicrosoft Windows (Computer file)$xSecurity measures.
650 0 $aComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 0 $aComputer security.
856 41 $3Table of contents only$uhttp://www.loc.gov/catdir/toc/ecip069/2006005530.html
856 42 $3Contributor biographical information$uhttp://www.loc.gov/catdir/enhancements/fy0741/2006005530-b.html
856 42 $3Publisher description$uhttp://www.loc.gov/catdir/enhancements/fy0741/2006005530-d.html