000 01579cam a22002898i 4500
001 19633934
003 APU
005 20180228111715.0
008 170512s2017 mau 000 0 eng
010 _a 2017018109
020 _a9781284121841 (pbk.)
040 _aDLC
_beng
_cDLC
_dWAN
042 _apcc
050 0 0 _aHV8079.C65
_bE37 2019
082 0 0 _a363.25/968
_223
100 1 _aEasttom, Chuck.
_913608
245 1 0 _aSystem forensics, investigation, and response /
_cChuck Easttom.
250 _a3rd ed.
260 _aBurlington, MA :
_bJones & Bartlett Learning,
_c[2019]
300 _axvi, 335 p. :
_bill. ;
_c23 cm.
500 _aRevised edition of the author's System forensics, investigation, and response, c2014.
505 0 _aIntroduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.
650 0 _aComputer crimes
_xInvestigation
_vTextbooks.
_937763
906 _a0
_bvip
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBook
999 _c381096
_d381096