Guide to Computer Forensics and Investigations
This second edition has been revised to include two new running cases and updated technology coverage. Authors Phillips and Enfinger have taught computer forensics for a number of years and bring a proven, classroom approach to teaching the topics in this text, while authors Nelson and Steuart are b...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Book |
Language: | English |
Published: |
Boston
Thomson Course Technology
2006
|
Edition: | SECOND EDITION |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000cam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-348029 | ||
005 | 2020018102542 | ||
008 | 231012t2006 -UK ag# ##001 ##eng#D | ||
020 | # | # | |a 0619217065 |q paperback |
020 | # | # | |a 9780619217068 (paperback) |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a ENGLISH |
090 | 0 | 0 | |a QA76.9 |b .N45 2006 |
100 | 1 | # | |a Nelson, Bill |e author |
245 | 1 | 1 | |a Guide to Computer Forensics and Investigations |c Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart |
250 | # | # | |a SECOND EDITION |
264 | # | 1 | |a Boston |b Thomson Course Technology |c 2006 |
300 | # | # | |a xxvii, 643 pages |b illustrations |c 24cm |e 2 Compact Disk + 1 DVD |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical reference (page 615-643) and index |
520 | # | # | |a This second edition has been revised to include two new running cases and updated technology coverage. Authors Phillips and Enfinger have taught computer forensics for a number of years and bring a proven, classroom approach to teaching the topics in this text, while authors Nelson and Steuart are both investigators and bring a real-world perspective to the text. Guide to Computer Forensics and Investigation presents methods to properly conduct a computer forensics investigation beginning with a discussion of ethics, while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Students should have a working knowledge of hardware and operating systems to maximize their success on projects and exercises throughout the text. |
650 | # | 0 | |a Computer crimes |x Investigation |
650 | # | 0 | |a Computer security |
700 | 1 | # | |a Phillips, Amelia |e author |
700 | 1 | # | |a Enfinger, Frank |e author |
700 | 1 | # | |a Steuart, Christopher |e author |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=348029 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00250##a002.5.2||00250##b002.5.3||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2|| |