Introductory computer forensics : a hands-on practical approach (Record no. 33323)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 241118b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030005801
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Item number LIN
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Lin, Xiaodong
245 ## - TITLE STATEMENT
Title Introductory computer forensics : a hands-on practical approach
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2018
Place of publication, distribution, etc Cham :
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 577 p. ;
Other physical details ill.,
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount 6104.46
Price type code
Unit of pricing 01
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
520 ## - SUMMARY, ETC.
Summary, etc This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students' understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
Topical term or geographic name as entry element B-tree
Topical term or geographic name as entry element Boot sector
Topical term or geographic name as entry element Computer forensics
Topical term or geographic name as entry element Disk image
Topical term or geographic name as entry element Forensic analysis
Topical term or geographic name as entry element MFT entry
Topical term or geographic name as entry element Ransomware
Topical term or geographic name as entry element Root directory
Topical term or geographic name as entry element SIM card
Topical term or geographic name as entry element Sleuth Kit
Topical term or geographic name as entry element Smartphone
Topical term or geographic name as entry element Steganography
Topical term or geographic name as entry element VMware
Topical term or geographic name as entry element Wireshark
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAU DAU 2024-11-12 Amazon 6104.46 364.168 LIN 035128 2024-11-18 Books

Powered by Koha