Cite This        Tampung        Export Record
Judul Digital Forensics, Investigation, and Response / Chuck Easttom
Pengarang Easttom,Chuck
EDISI 4th. Ed.
Penerbitan Burlington : Jones & Bartlett Learning, 2022
Deskripsi Fisik xix, 403p. :ill. ;23 Cm.
ISBN 978-1-284-22606-5
Subjek COMPUTER CRIMES - INVESTIGATION
Catatan ISSA: Information Systems Security & Assurances Series
Termasuk bibliografi
Contents: I. Introduction to forensics 1. Introduction to forensics 2. Overview to computer crime 3. Forensic methods and labs II. Forensics tools, Techniques, and Methods 4. Collecting, seizing, and protecting evidence 5. Understanding techniques for hiding and scrambling 6. Recovering data 7. Incident response III. Branches of digital forensics 8. Windows forensics 9. Linux forensics 10. Mac OS forensics 11. Email forensics 12. Mobile forensics 13. Network forensics 14. Memory forensics 15. Trends and future directions APPENDIX A Answer key APPENDIX B Standard acronyms Glossary of key terms
Bahasa Inggris
Bentuk Karya Bukan fiksi atau tidak didefinisikan
Target Pembaca Umum

 
No Barcode No. Panggil Akses Lokasi Ketersediaan
288122212 363.259 68 Eas d Dapat dipinjam Perpustakaan Pusat - KK KKB
Koleksi Khusus
Dipinjam
Tag Ind1 Ind2 Isi
001 INLIS000000000150399
005 20250620013734
007 ta
008 250620################g##########0#eng##
020 # # $a 978-1-284-22606-5
035 # # $a 0010-0123000038
082 # # $a 363.259 68
084 # # $a 363.259 68 Eas d
100 1 # $a Easttom,Chuck
245 1 # $a Digital Forensics, Investigation, and Response /$c Chuck Easttom
250 # # $a 4th. Ed.
260 # # $a Burlington :$b Jones & Bartlett Learning,$c 2022
300 # # $a xix, 403p. : $b ill. ; $c 23 Cm.
500 # # $a ISSA: Information Systems Security & Assurances Series
504 # # $a Termasuk bibliografi
505 # # $a Contents: I. Introduction to forensics 1. Introduction to forensics 2. Overview to computer crime 3. Forensic methods and labs II. Forensics tools, Techniques, and Methods 4. Collecting, seizing, and protecting evidence 5. Understanding techniques for hiding and scrambling 6. Recovering data 7. Incident response III. Branches of digital forensics 8. Windows forensics 9. Linux forensics 10. Mac OS forensics 11. Email forensics 12. Mobile forensics 13. Network forensics 14. Memory forensics 15. Trends and future directions APPENDIX A Answer key APPENDIX B Standard acronyms Glossary of key terms
650 # # $a COMPUTER CRIMES - INVESTIGATION
990 # # $a 288122212
Content Unduh katalog