000 01777cam a2200313 i 4500
999 _c26398
_d26397
001 19633934
003 SA-RiNAUS
005 20190414112129.0
008 170512s2017 mau b 001 0 eng
020 _a9781284121841
040 _aDLC
_beng
_cDLC
_erda
_dDLC
082 0 0 _a363.25968
_223
_bE C S
100 1 _aEasttom, Chuck,
_eauthor.
_92350
245 1 0 _aSystem forensics, investigation, and response /
_cChuck Easttom.
250 _aThird Edition.
264 1 _aBurlington, MA :
_bJones & Bartlett Learning,
_c[2019]
300 _axvii, 335 pages ;
_c23 cm
500 _aRevised edition of the author's System forensics, investigation, and response, c2014.
500 _aشراء معرض القاهرة للكتاب 2019
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources.
650 0 _aComputer crimes
_xInvestigation
_vTextbooks.
_92437
942 _2ddc
_cBK