It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:341953516:2043
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:341953516:2043?format=raw

LEADER: 02043cam 22003974a 4500
001 9920750430001661
005 20150423131455.0
008 060216s2006 inua b 001 0 eng
010 $a 2006005530
020 $a0470038624 (pbk.)
024 3 $a9780470038628
035 $a(CSdNU)u278791-01national_inst
035 $a(OCoLC)64390409
035 $a(OCoLC)64390409
040 $aDLC$cDLC$dBAKER$dC#P
042 $apcc
043 $an-us---
049 $aCNUM
050 00 $aHV8079.C65$bS84 2006
082 00 $a363.25/968$222
100 1 $aSteel, Chad,$d1975-
245 10 $aWindows forensics :$bthe field guide for conducting corporate computer investigations /$cChad Steel.
260 $aIndianapolis, IN :$bWiley Pub., Inc.,$cc2006.
300 $axvii, 382 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aWindows forensics -- Processing the digital crime scene -- Windows forensics basics -- Partitions and file systems -- Directory structure and special files -- The registry -- Forensic analysis -- Live system analysis -- Forensic duplication -- File system analysis -- Log file analysis -- Internet usage analysis -- Email investigations -- App. A. Sample chain of custody form -- App. B. Master boot record layout -- App. C. Partition types -- App. D. Fat32 boot sector layout -- App. E. NTFS boot sector layout -- App. F. NTFS metafiles -- App. G. Well-known SIDs -- Index.
630 00 $aMicrosoft Windows (Computer file)$xSecurity measures.
650 0 $aComputer crimes$xInvestigation$zUnited States$xMethodology.
650 0 $aComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 0 $aComputer security.
938 $aBaker & Taylor$bBKTY$c39.99$d29.99$i0470038624$n0006717074$sactive
947 $fSOBM-CJ$hCIRCSTACKS$p$37.99$q1
949 $aHV 8079.C65 S84 2006$i31786102286306
994 $a92$bCNU
999 $aHV 8079 .C65 S84 2006$wLC$c1$i31786102286306$d10/16/2006$e8/21/2006 $lCIRCSTACKS$mNULS$n1$rY$sY$tBOOK$u7/27/2006