Asia Pacific University Library catalogue


System forensics, investigation, and response / (Record no. 381096)

000 -LEADER
fixed length control field 01579cam a22002898i 4500
001 - CONTROL NUMBER
control field 19633934
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180228111715.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170512s2017 mau 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2017018109
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284121841 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency WAN
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8079.C65
Item number E37 2019
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25/968
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Easttom, Chuck.
9 (RLIN) 13608
245 10 - TITLE STATEMENT
Title System forensics, investigation, and response /
Statement of responsibility, etc Chuck Easttom.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington, MA :
Name of publisher, distributor, etc Jones & Bartlett Learning,
Date of publication, distribution, etc [2019]
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 335 p. :
Other physical details ill. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Revised edition of the author's System forensics, investigation, and response, c2014.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Investigation
Form subdivision Textbooks.
9 (RLIN) 37763
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b vip
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Use restrictions Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type Invoice number PO number Total Renewals Checked out
Not Withdrawn Available   Not Damaged No use restrictions Available for loan Book APU Library APU Library Open Shelf 02/01/2018 EMO 361.90 1 HV8079.C65 E37 2019 c.1 00037542 28/08/2018 02/05/2018 1 361.90 02/01/2018 Staff Circulation I-019908 2017/11/2520    
Not Withdrawn Available   Not Damaged No use restrictions Available for loan Book APU Library APU Library Open Shelf 02/01/2018 EMO 361.90 8 HV8079.C65 E37 2019 c.2 00037543 04/10/2024 04/10/2024 2 361.90 02/01/2018 General Circulation I-019908 2017/11/2520 8 11/10/2024