000 | 01620cam a22004697a 4500 | ||
---|---|---|---|
001 | BDZ0006979221 | ||
003 | StDuBDS | ||
005 | 20201209145557.0 | ||
008 | 050511s2005 njua f 001 0 eng d | ||
010 | _a2005927367 | ||
020 | _a9780321240699 | ||
020 | _a0321240693 | ||
035 | _a(DLC)2005927367 | ||
040 |
_aUKM _cUKM _dBAKER _dDST _dDLC _dStDuBDSZ |
||
042 | _alccopycat | ||
050 | 0 | _bJ66 2005 | |
072 | 7 |
_aUN _2thema |
|
072 | 7 |
_aURY _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | _a005.8 | ||
100 | 1 |
_aJones, Keith J. _q(Keith John) |
|
245 | 1 | 0 |
_aReal digital forensics : _bcomputer security and incident response / _cKeith J. Jones, Richard Bejtlich, Curtis W. Rose. |
260 |
_aUpper Saddle River, NJ : _bAddison-Wesley, _c2005. |
||
300 |
_axxx, 650 p. : _bill. ; _c24 cm. + _e1 videodisc |
||
500 | _aIncludes index. | ||
504 | _aIncludes index. | ||
505 | 0 | _aLive incident response -- Network-based forensics -- Acquiring a forensic duplication -- Forensic analysis techniques -- Creating a complete forensic tool kit -- Mobile device forensics -- Online-based forensics. | |
590 | _a44.51 | ||
590 | _aDVD to accompany book available at issue desk. | ||
650 | 0 |
_aComputer crimes _xInvestigation |
|
650 | 0 | _aDigital forensic science. | |
650 | 0 | _aComputer security. | |
650 | 7 |
_aDatabases _2thema |
|
650 | 7 |
_aData encryption _2thema |
|
650 | 7 |
_aNetwork security _2thema |
|
700 | 1 | _aRose, Curtis W. | |
700 | 1 | _aBejtlich, Richard. | |
902 | _a161109 | ||
907 |
_a.b1048565x _bcgen _c- |
||
942 | _n0 | ||
998 |
_b0 _c161109 _dm _ea _f- _g0 |
||
999 |
_c46430 _d46430 |