Record ID | marc_nuls/NULS_PHC_180925.mrc:83575557:3632 |
Source | marc_nuls |
Download Link | /show-records/marc_nuls/NULS_PHC_180925.mrc:83575557:3632?format=raw |
LEADER: 03632cam 2200433Ia 4500
001 9920998580001661
005 20150423132651.0
008 051222s2006 njua f 001 0 eng d
020 $a0321240693 (pbk.)
024 3 $a9780321240699
029 1 $aYDXCP$b2234706
035 $a(CSdNU)u288329-01national_inst
035 $a(OCoLC)62732700
035 $a(OCoLC)62732700
035 $a(OCoLC)62732700
040 $aTXA$cTXA$dBAKER$dOCO$dVP@$dYDXCP$dOCLCQ$dBTCTA$dOrLoB-B
049 $aCNUM
050 4 $aHV8079.C65$bJ66 2006
100 1 $aJones, Keith J.$q(Keith John)
245 10 $aReal digital forensics :$bcomputer security and incident response / $cKeith J. Jones, Richard Bejtlich, Curtis W. Rose.
260 $aUpper Saddle River, NJ :$bAddison-Wesley,$cc2006.
300 $axxx, 650 p. :$bill. ;$c24 cm. +$e1 DVD-ROM (4 3/4 in.)
500 $a"First printing, September 2005"--T.p. verso.
500 $aAccompanying DVD-ROM contains "several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realistic setting"--P. [4] of cover.
500 $aIncludes index.
505 0 $aPt. I. Live incident response -- Ch. 1. Windows live response -- Ch. 2. Unix live response -- Pt. II. Network-based forensics -- Ch. 3. Collecting network-based evidence -- Ch. 4. Analyzing network-based evidence for a Windows intrusion -- Ch. 5. Analyzing network-based evidence for a Unix intrusion -- Pt. III. Acquiring a forensic duplication -- Ch. 6. Before you jump right in ... -- Ch. 7. Commercial-based forensic duplications -- Ch. 8. Noncommercial-based forensic duplications -- Pt. IV. Forensic analysis techniques -- Ch. 9. Common forensic analysis techniques -- Ch. 10. Web browsing activity reconstruction -- Ch. 11. E-mail activity reconstruction -- Ch. 12. Microsoft Windows registry reconstruction -- Ch. 13. Forensic tool analysis : an introduction to using Linux for analyzing files of unknown origin -- Ch. 14. Forensic tool analysis : a hands-on analysis of the Linux file aio -- Ch. 15. Forensic tool analysis : analyzing files of unknown origin (Windows) -- Pt. V. Creating a complete forensic tool kit -- Ch. 16. Building the ultimate response CD -- Ch. 17. Making your CD-ROM a bootable environment -- Pt. VI. Mobile device forensics -- Ch. 18. Forensic duplication and analysis of personal digital assistants -- Ch. 19. Forensic duplication of USB and compact flash memory devices -- Ch. 20. Forensic analysis of USB and compact flash memory devices -- Pt. VII. Online-based forensics -- Ch. 21. Tracing E-mail -- Ch. 22. Domain name ownership -- App. An introduction to Perl.
538 $aSystem requirements for accompanying DVD-ROM: Microsoft Windows 2000/XP and an open source version of Unix, such as FreeBSD, OpenBSD, NetBSD, or Linux; DVD-ROM drive.
650 0 $aComputer crimes$xInvestigation.
650 0 $aComputer security.
700 1 $aBejtlich, Richard.
700 1 $aRose, Curtis W.
938 $aBaker & Taylor$bBKTY$c49.99$d37.49$i0321240693$n0006425960$sactive
938 $aYBP Library Services$bYANK$n2234706
938 $aBaker and Taylor$bBTCP$nbl2005025255
947 $fSOBM-FS$hCIRCSTACKS$p$52.24$q1
949 $aHV 8079.C65 J66 2006$i31786102251946
994 $a92$bCNU
999 $aHV 8079 .C65 J66 2006$wLC$c1$i31786102251946$d5/22/2009$e10/21/2008 $lCIRCSTACKS$mNULS$n3$q1$rY$sY$tBOOK$u1/2/2007
999 $aHV 8079 .C65 J66 2006$vDVD$wLC$c1$i31786102473235$d11/3/2008 $e10/21/2008$lMULTIMEDIA$mNULS$n1$rY$sY$tDVD$u1/8/2007