Guide to computer forensics and investigations / (رقم التسجيلة. 31589)
[ عرض عادي ]
| 003 - محدد رقم الضبط | |
|---|---|
| محدد رقم الضبط | SA-RiNAUS |
| 005 - تاريخ/وقت أخر معالجة | |
| حقول الضبط | 20211011144455.0 |
| 008 - عناصر البيانات ثابتة الطول | |
| عناصر البيانات ثابتة الطول | 180228s2019 maua b 001 0 eng d |
| 020 ## - ردمك | |
| ردمك | 9781337568944 |
| ردمك | 1337568945 |
| 082 04 - رقم تصنيف ديوي العشري | |
| رقم تصنيف ديوي | 005.8 |
| اصدار خطة التصنيف | 23 |
| رقم المادة | N B G |
| 100 1# - المؤلف - اسم شخصي (مدخل رئيسي) | |
| الاسم (اسم العائلة، الاسماء الاولى | Nelson, Bill, |
| مصطلح مرتبط | author. |
| 245 10 - العنوان | |
| العنوان الفعلي | Guide to computer forensics and investigations / |
| بيان المسئولية | Bill Nelson, Amelia Phillips, Chris Steuart. |
| 250 ## - الطبعة | |
| بيان الطبعة | Sixth edition. |
| 264 #1 - إنتاج، نشر، توزيع، طبع، حق النشر | |
| مكان النشر | Boston, MA : |
| الناشر | Cengage, |
| تاريخ النشر | [2019] |
| التاريخ الهجري | 1430. |
| تاريخ النشر | ©2019 |
| 300 ## - الوصف المادي | |
| التعداد | xxx, 738 pages : |
| بيانات مادية أخرى | illustrations (some color) ; |
| اﻷبعاد | 24 cm |
| 500 ## - تبصرة عامة | |
| تبصرة عامة | "Information security" |
| تبصرة عامة | مشتريات معرض الرياض الدولي للكتاب2021. |
| 504 ## - تبصرة ببليوجرافية | |
| تبصرة ببليوجرافية | Includes bibliographical references (pages 685-690) and index. |
| 505 0# - تبصرة محتويات | |
| تبصرة المحتويات | Machine generated contents note: An Overview of Digital Forensics -- Digital Forensics and Other Related Disciplines -- A Brief History of Digital Forensics -- Understanding Case Law -- Developing Digital Forensics Resources -- Preparing for Digital Investigations -- Understanding Law Enforcement Agency Investigations -- Following Legal Processes -- Understanding Private-Sector Investigations -- Maintaining Professional Conduct -- Preparing a Digital Forensics Investigation -- An Overview of a Computer Crime -- An Overview of a Company Policy Violation -- Taking a Systematic Approach -- Procedures for Private-Sector High-Tech Investigations -- Employee Termination Cases -- Internet Abuse Investigations -- E-mail Abuse Investigations -- Attorney-Client Privilege Investigations -- Industrial Espionage Investigations -- Understanding Data Recovery Workstations and Software -- Setting Up Your Workstation for Digital Forensics -- Conducting an Investigation -- Gathering the Evidence -- Understanding Bit-stream Copies -- Analyzing Your Digital Evidence -- Completing the Case -- Critiquing the Case -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Understanding Forensics Lab Accreditation Requirements -- Identifying Duties of the Lab Manager and Staff -- Lab Budget Planning -- Acquiring Certification and Training -- Determining the Physical Requirements for a Digital Forensics Lab -- Identifying Lab Security Needs -- Conducting High-Risk Investigations -- Using Evidence Containers -- Overseeing Facility Maintenance -- Considering Physical Security Needs -- Auditing a Digital Forensics Lab -- Determining Floor Plans for Digital Forensics Labs -- Selecting a Basic Forensic Workstation -- Selecting Workstations for a Lab -- Selecting Workstations for Private-Sector Labs -- Stocking Hardware Peripherals -- Maintaining Operating Systems and Software Inventories -- Using a Disaster Recovery Plan Planning for Equipment Upgrades -- Building a Business Case for Developing a Forensics Lab -- Preparing a Business Case for a Digital Forensics Lab -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Understanding Storage Formats for Digital Evidence -- Raw Format -- Proprietary Formats -- Advanced Forensic Format -- Determining the Best Acquisition Method -- Contingency Planning for Image Acquisitions -- Using Acquisition Tools -- Mini-WinFE Boot CDs and USB Drives -- Acquiring Data with a Linux Boot CD -- Capturing an Image with AccessData FTK Imager Lite -- Validating Data Acquisitions -- Linux Validation Methods -- Windows Validation Methods -- Performing RAID Data Acquisitions -- Understanding RAID -- Acquiring RAID Disks -- Using Remote Network Acquisition Tools -- Remote Acquisition with ProDiscover -- Remote Acquisition with EnCase Enterprise -- Remote Acquisition with R-Tools R-Studio -- Remote Acquisition with WetStone US-LATT PRO -- Remote Acquisition with F-Response -- Using Other Forensics Acquisition Tools -- PassMark Software ImageUSB -- ASR Data SMART -- Runtime Software -- ILookIX IXImager -- SourceForge -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Identifying Digital Evidence -- Understanding Rules of Evidence -- Collecting Evidence in Private-Sector Incident Scenes -- Processing Law Enforcement Crime Scenes -- Understanding Concepts and Terms Used in Warrants -- Preparing for a Search -- Identifying the Nature of the Case -- Identifying the Type of OS or Digital Device -- Determining Whether You Can Seize Computers and Digital Devices -- Getting a Detailed Description of the Location -- Determining Who Is in Charge -- Using Additional Technical Expertise -- Determining the Tools You Need -- Preparing the Investigation Team -- Securing a Digital Incident or Crime Scene -- Seizing Digital Evidence at the Scene -- Preparing to Acquire Digital Evidence -- Processing Incident or Crime Scenes -- Processing Data Centers with RAID Systems -- Using a Technical Advisor -- Documenting Evidence in the Lab -- Processing and Handling Digital Evidence -- Storing Digital Evidence -- Evidence Retention and Media Storage Needs -- Documenting Evidence -- Obtaining a Digital Hash -- Reviewing a Case -- Sample Civil Investigation -- An Example of a Criminal Investigation -- Reviewing Background Information for a Case -- Planning the Investigation -- Conducting the Investigation: Acquiring Evidence with OSForensics -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Understanding File Systems -- Understanding the Boot Sequence -- Understanding Disk Drives -- Solid-State Storage Devices -- Exploring Microsoft File Structures -- Disk Partitions -- Examining FAT Disks -- Examining NTFS Disks -- NTFS System Files -- MFT and File Attributes -- MFT Structures for File Data -- NTFS Alternate Data Streams -- NTFS Compressed Files -- NTFS Encrypting File System -- EFS Recovery Key Agent -- Deleting NTFS Files -- Resilient File System -- Understanding Whole Disk Encryption -- Examining Microsoft BitLocker -- Examining Third-Party Disk Encryption Tools -- Understanding the Windows Registry -- Exploring the Organization of the Windows Registry -- Examining the Windows Registry -- Understanding Microsoft Startup Tasks -- Startup in Windows 7, Windows 8, and Windows 10 -- Startup in Windows NT and Later -- Understanding Virtual Machines -- Creating a Virtual Machine -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Evaluating Digital Forensics Tool Needs -- Types of Digital Forensics Tools -- Tasks Performed by Digital Forensics Tools -- Tool Comparisons -- Other Considerations for Tools -- Digital Forensics Software Tools -- Command-Line Forensics Tools -- Linux Forensics Tools -- Other GUI Forensics Tools -- Digital Forensics Hardware Tools -- Forensic Workstations -- Using a Write-Blocker -- Recommendations for a Forensic Workstation -- Validating and Testing Forensics Software -- Using National Institute of Standards and Technology Tools -- Using Validation Protocols -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Examining Linux File Structures -- File Structures in Ext4 -- Understanding Macintosh File Structures -- An Overview of Mac File Structures -- Forensics Procedures in Mac -- Using Linux Forensics Tools -- Installing Sleuth Kit and Autopsy -- Examining a Case with Sleuth Kit and Autopsy -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Recognizing a Graphics File -- Understanding Bitmap and Raster Images -- Understanding Vector Graphics -- Understanding Metafile Graphics -- Understanding Graphics File Formats -- Understanding Digital Photograph File Formats -- Understanding Data Compression -- Lossless and Lossy Compression -- Locating and Recovering Graphics Files -- Identifying Graphics File Fragments -- Repairing Damaged Headers -- Searching for and Carving Data from Unallocated Space -- Rebuilding File Headers -- Reconstructing File Fragments -- Identifying Unknown File Formats -- Analyzing Graphics File Headers -- Tools for Viewing Images -- Understanding Steganography in Graphics Files -- Using Steganalysis Tools -- Understanding Copyright Issues with Graphics -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Determining What Data to Collect and Analyze -- Approaching Digital Forensics Cases -- Using Autopsy to Validate Data -- Collecting Hash Values in Autopsy -- Validating Forensic Data -- Validating with Hexadecimal Editors -- Validating with Digital Forensics Tools -- Addressing Data-Hiding Techniques -- Hiding Files by Using the OS -- Hiding Partitions -- Marking Bad Clusters -- Bit-Shifting -- Understanding Steganalysis Methods -- Examining Encrypted Files -- Recovering Passwords -- Chapter Summary -- Key Terms |
| تبصرة المحتويات | -- Review Questions -- Hands-On Projects -- Case Projects -- An Overview of Virtual Machine Forensics -- Type 2 Hypervisors -- Conducting an Investigation with Type 2 Hypervisors -- Working with Type 1 Hypervisors -- Performing Live Acquisitions -- Performing a Live Acquisition in Windows -- Network Forensics Overview -- The Need for Established Procedures -- Securing a Network -- Developing Procedures for Network Forensics -- Investigating Virtual Networks -- Examining the Honeynet Project -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Exploring the Role of E-mail in Investigations -- Exploring the Roles of the Client and Server in E-mail -- Investigating E-mail Crimes and Violations -- Understanding Forensic Linguistics -- Examining E-mail Messages -- Viewing E-mail Headers -- Examining E-mail Headers -- Examining Additional E-mail Files -- Tracing an E-mail Message -- Using Network E-mail Logs -- Understanding E-mail Servers -- Examining UNIX E-mail Server Logs -- Examining Microsoft E-mail Server Logs -- Using Specialized E-mail Forensics Tools -- Using Magnet AXIOM to Recover E-mail -- Using a Hex Editor to Carve E-mail Messages -- Recovering Outlook Files -- E-mail Case Studies -- Applying Digital Forensics Methods to Social Media Communications -- Social Media Forensics on Mobile Devices -- Forensics Tools for Social Media Investigations -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Understanding Mobile Device Forensics -- Mobile Phone Basics -- Inside Mobile Devices -- Understanding Acquisition Procedures for Mobile Devices -- Mobile Forensics Equipment -- Using Mobile Forensics Tools -- Understanding Forensics in the Internet of Anything -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- An Overview of Cloud Computing -- History of the Cloud -- Cloud Service Levels and Deployment Methods -- Cloud Vendors |
| تبصرة المحتويات | Note continued: Basic Concepts of Cloud Forensics -- Legal Challenges in Cloud Forensics -- Service Level Agreements -- Jurisdiction Issues -- Accessing Evidence in the Cloud -- Technical Challenges in Cloud Forensics -- Architecture -- Analysis of Cloud Forensic Data -- Anti-Forensics -- Incident First Responders -- Role Management -- Standards and Training -- Acquisitions in the Cloud -- Encryption in the Cloud -- Conducting a Cloud Investigation -- Investigating CSPs -- Investigating Cloud Customers -- Understanding Prefetch Files -- Examining Stored Cloud Data on a PC -- Windows Prefetch Artifacts -- Tools for Cloud Forensics -- Forensic Open-Stack Tools -- F-Response for the Cloud -- Magnet AXIOM Cloud -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Understanding the Importance of Reports -- Limiting a Report to Specifics -- Types of Reports -- Guidelines for Writing Reports -- What to Include in Written Preliminary Reports -- Report Structure -- Writing Reports Clearly -- Designing the Layout and Presentation of Reports -- Generating Report Findings with Forensics Software Tools -- Using Autopsy to Generate Reports -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Preparing for Testimony -- Documenting and Preparing Evidence -- Reviewing Your Role as a Consulting Expert or an Expert Witness -- Creating and Maintaining Your CV -- Preparing Technical Definitions -- Preparing to Deal with the News Media -- Testifying in Court -- Understanding the Trial Process -- Providing Qualifications for Your Testimony -- General Guidelines on Testifying -- Testifying During Direct Examination -- Testifying During Cross-Examination -- Preparing for a Deposition or Hearing -- Guidelines for Testifying at Depositions -- Guidelines for Testifying at Hearings -- Preparing Forensics Evidence for Testimony -- Preparing a Defense of Your Evidence-Collection Methods -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects -- Applying Ethics and Codes to Expert Witnesses -- Forensics Examiners' Roles in Testifying -- Considerations in Disqualification -- Traps for Unwary Experts -- Determining Admissibility of Evidence -- Organizations with Codes of Ethics -- International Society of Forensic Computer Examiners -- International High Technology Crime Investigation Association -- International Association of Computer Investigative Specialists -- American Bar Association -- American Psychological Association -- Ethical Difficulties in Expert Testimony -- Ethical Responsibilities Owed to You -- Standard Forensics Tools and Tools You Create -- An Ethics Exercise -- Performing a Cursory Exam of a Forensic Image -- Performing a Detailed Exam of a Forensic Image -- Performing the Exam -- Interpreting Attribute ox8o Data Runs -- Carving Data Run Clusters Manually -- Chapter Summary -- Key Terms -- Review Questions -- Hands-On Projects -- Case Projects. |
| 650 #4 - رأس موضوع - مصطلح موضوعي | |
| الموضوع | Computer crimes |
| تقسيم فرعي عام | Investigation. |
| الموضوع | Computer security. |
| الموضوع | Computer crimes |
| تقسيم فرعي عام | Investigation. |
| الموضوع | Computer security. |
| 700 1# - مدخل اضافي - المؤلف اسم شخصي | |
| إسم الشخص | Phillips, Amelia, |
| مصطلح مرتبط | author. |
| إسم الشخص | Steuart, Christopher, |
| مصطلح مرتبط | author. |
| 942 ## - مداخل إضافية خاصة بكوها | |
| مصدر خطة التصنيف أو الترفيف | Dewey Decimal Classification |
| نوع المادة | كتب |
| 100 1# - المؤلف - اسم شخصي (مدخل رئيسي) | |
| -- | 26565 |
| -- | 26570 |
| -- | 26571 |
| 700 1# - مدخل اضافي - المؤلف اسم شخصي | |
| -- | 26568 |
| -- | 26569 |
| حالة اﻹلغاء | مادة مفقودة | مصدر خطة التصنيف أو الترفيف | حالة التلف | غير مسموح باﻹعارة | موقع غير دائم | الموقع الحالي | موقع الترفيف | تاريخ التزويد | مصدر التزويد | سعر الشراء | رقم الطلب بالكامل | رقم النسخة | آخر تاريخ للعرض | رقم النسخة | السعر فعال من تاريخ | نوع المادة في كوها | ملاحظة عامة | إجمالي اﻹعارات | آخر تاريخ إعارة |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Not For Loan | المكتبة الأمنية | المكتبة الأمنية | القاعة الرئيسية | 18/10/2021 | شراء | 250.00 | 005.8 N B G | 010059133 | 18/10/2021 | 1 | 18/10/2021 | كتب | كتب أجنبية | |||||
| Dewey Decimal Classification | المكتبة الأمنية | المكتبة الأمنية | القاعة الرئيسية | 18/10/2021 | شراء | 250.00 | 005.8 N B G | 010059134 | 19/09/2023 | 2 | 18/10/2021 | كتب | كتب أجنبية | 3 | 05/09/2023 |