Guide to Computer Forensics and Investigations

This second edition has been revised to include two new running cases and updated technology coverage. Authors Phillips and Enfinger have taught computer forensics for a number of years and bring a proven, classroom approach to teaching the topics in this text, while authors Nelson and Steuart are b...

Full description

Saved in:
Bibliographic Details
Main Authors: Nelson, Bill (Author), Phillips, Amelia (Author), Enfinger, Frank (Author), Steuart, Christopher (Author)
Format: Book
Language:English
Published: Boston Thomson Course Technology 2006
Edition:SECOND EDITION
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000cam#a2200000#i#4501
001 wils-348029
005 2020018102542
008 231012t2006 -UK ag# ##001 ##eng#D
020 # # |a 0619217065  |q paperback 
020 # # |a 9780619217068 (paperback) 
040 # # |a UiTM  |e rda 
041 0 # |a ENGLISH 
090 0 0 |a QA76.9  |b .N45 2006 
100 1 # |a Nelson, Bill  |e author 
245 1 1 |a Guide to Computer Forensics and Investigations  |c Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart 
250 # # |a SECOND EDITION 
264 # 1 |a Boston  |b Thomson Course Technology  |c 2006 
300 # # |a xxvii, 643 pages  |b illustrations  |c 24cm  |e 2 Compact Disk + 1 DVD 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical reference (page 615-643) and index 
520 # # |a This second edition has been revised to include two new running cases and updated technology coverage. Authors Phillips and Enfinger have taught computer forensics for a number of years and bring a proven, classroom approach to teaching the topics in this text, while authors Nelson and Steuart are both investigators and bring a real-world perspective to the text. Guide to Computer Forensics and Investigation presents methods to properly conduct a computer forensics investigation beginning with a discussion of ethics, while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Students should have a working knowledge of hardware and operating systems to maximize their success on projects and exercises throughout the text. 
650 # 0 |a Computer crimes  |x Investigation 
650 # 0 |a Computer security 
700 1 # |a Phillips, Amelia  |e author 
700 1 # |a Enfinger, Frank  |e author 
700 1 # |a Steuart, Christopher  |e author 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=348029 
964 # # |c BOK  |d 01 
998 # # |a 00250##a002.5.2||00250##b002.5.3||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||