| 000 | 01777cam a2200313 i 4500 | ||
|---|---|---|---|
| 999 |
_c26398 _d26397 |
||
| 001 | 19633934 | ||
| 003 | SA-RiNAUS | ||
| 005 | 20190414112129.0 | ||
| 008 | 170512s2017 mau b 001 0 eng | ||
| 020 | _a9781284121841 | ||
| 040 |
_aDLC _beng _cDLC _erda _dDLC |
||
| 082 | 0 | 0 |
_a363.25968 _223 _bE C S |
| 100 | 1 |
_aEasttom, Chuck, _eauthor. _92350 |
|
| 245 | 1 | 0 |
_aSystem forensics, investigation, and response / _cChuck Easttom. |
| 250 | _aThird Edition. | ||
| 264 | 1 |
_aBurlington, MA : _bJones & Bartlett Learning, _c[2019] |
|
| 300 |
_axvii, 335 pages ; _c23 cm |
||
| 500 | _aRevised edition of the author's System forensics, investigation, and response, c2014. | ||
| 500 | _aشراء معرض القاهرة للكتاب 2019 | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aIntroduction to forensics -- Introduction to forensics -- Overview of computer crime -- Forensic methods and labs -- Technical overview: system forensics tools, techniques, and methods -- Collecting, seizing, and protecting evidence -- Understanding techniques for hiding and scrambling information -- Recovering data -- E-mail forensics -- Windows forensics -- Linux forensics -- Macintosh forensics -- Mobile forensics -- Performing network analysis -- Incident response and resources -- Incident and intrusion response -- Trends and future directions -- System forensics resources. | |
| 650 | 0 |
_aComputer crimes _xInvestigation _vTextbooks. _92437 |
|
| 942 |
_2ddc _cBK |
||