
| Judul | Digital Forensics, Investigation, and Response / Chuck Easttom |
| Pengarang | Easttom,Chuck |
| EDISI | 4th. Ed. |
| Penerbitan | Burlington : Jones & Bartlett Learning, 2022 |
| Deskripsi Fisik | xix, 403p. :ill. ;23 Cm. |
| ISBN | 978-1-284-22606-5 |
| Subjek | COMPUTER CRIMES - INVESTIGATION |
| Catatan | ISSA: Information Systems Security & Assurances Series Termasuk bibliografi Contents: I. Introduction to forensics 1. Introduction to forensics 2. Overview to computer crime 3. Forensic methods and labs II. Forensics tools, Techniques, and Methods 4. Collecting, seizing, and protecting evidence 5. Understanding techniques for hiding and scrambling 6. Recovering data 7. Incident response III. Branches of digital forensics 8. Windows forensics 9. Linux forensics 10. Mac OS forensics 11. Email forensics 12. Mobile forensics 13. Network forensics 14. Memory forensics 15. Trends and future directions APPENDIX A Answer key APPENDIX B Standard acronyms Glossary of key terms |
| Bahasa | Inggris |
| Bentuk Karya | Bukan fiksi atau tidak didefinisikan |
| Target Pembaca | Umum |
| No Barcode | No. Panggil | Akses | Lokasi | Ketersediaan |
|---|---|---|---|---|
| 288122212 | 363.259 68 Eas d | Dapat dipinjam | Perpustakaan Pusat - KK KKB Koleksi Khusus |
Dipinjam |
| Tag | Ind1 | Ind2 | Isi |
| 001 | INLIS000000000150399 | ||
| 005 | 20250620013734 | ||
| 007 | ta | ||
| 008 | 250620################g##########0#eng## | ||
| 020 | # | # | $a 978-1-284-22606-5 |
| 035 | # | # | $a 0010-0123000038 |
| 082 | # | # | $a 363.259 68 |
| 084 | # | # | $a 363.259 68 Eas d |
| 100 | 1 | # | $a Easttom,Chuck |
| 245 | 1 | # | $a Digital Forensics, Investigation, and Response /$c Chuck Easttom |
| 250 | # | # | $a 4th. Ed. |
| 260 | # | # | $a Burlington :$b Jones & Bartlett Learning,$c 2022 |
| 300 | # | # | $a xix, 403p. : $b ill. ; $c 23 Cm. |
| 500 | # | # | $a ISSA: Information Systems Security & Assurances Series |
| 504 | # | # | $a Termasuk bibliografi |
| 505 | # | # | $a Contents: I. Introduction to forensics 1. Introduction to forensics 2. Overview to computer crime 3. Forensic methods and labs II. Forensics tools, Techniques, and Methods 4. Collecting, seizing, and protecting evidence 5. Understanding techniques for hiding and scrambling 6. Recovering data 7. Incident response III. Branches of digital forensics 8. Windows forensics 9. Linux forensics 10. Mac OS forensics 11. Email forensics 12. Mobile forensics 13. Network forensics 14. Memory forensics 15. Trends and future directions APPENDIX A Answer key APPENDIX B Standard acronyms Glossary of key terms |
| 650 | # | # | $a COMPUTER CRIMES - INVESTIGATION |
| 990 | # | # | $a 288122212 |
Content Unduh katalog
Karya Terkait :