|
|
|
|
LEADER |
00000cam a22000004a 4500 |
001 |
in00002662005 |
003 |
OCoLC |
005 |
20220616123919.0 |
008 |
011003t20022002flua bf 001 0 eng |
010 |
|
|
|a 2001053817
|
020 |
|
|
|a 0849309557 (alk. paper)
|
035 |
|
|
|a (OCoLC)48140454
|
040 |
|
|
|a DLC
|c DLC
|d C#P
|d CUM
|d EEM
|d UtOrBLW
|
042 |
|
|
|a pcc
|
049 |
|
|
|a EEMR
|
050 |
0 |
0 |
|a HV8079.C65
|b C93 2002
|
082 |
0 |
0 |
|a 363.25/968
|2 21
|
245 |
0 |
0 |
|a Cyber forensics :
|b a field manual for collecting, examining, and preserving evidence of computer crimes /
|c Albert J. Marcella, Robert S. Greenfield, editors.
|
260 |
|
|
|a Boca Raton, Fla. :
|b Auerbach,
|c [2002], ©2002.
|
300 |
|
|
|a xx, 443 pages :
|b illustrations ;
|c 26 cm
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 415-423) and index.
|
505 |
0 |
|
|a Cyber forensics. The goal of the forensic investigation ; How to begin a nonliturgical forensic investigation / Carol Stucki -- The liturgical forensic examination : tracing activity on a Windows-based desktop / Robert E. Greenfield -- Basics of Internet abuse : what is possible and where to look under the hood / John W. Rado -- Tools of the trade : automated tools used to secure a system throughout the stages of a forensic investigation / Brent Deterdeing -- Network intrusion management and profiling / Steven Schlarman -- Cyber forensics and the legal system / Abigail Abraham. Federal and international guidelines. Seaching and seizing computers and obtaining electronic evidence -- Computer crime policy and programs -- International aspects of computer crime -- Privacy issues in the high-tech context / The Department of Justice Privacy Council -- Critical infrastructure protection -- Electronic commerce : legal issues / The Electronic Commerce Working Group (ECWG), Department of Justice -- Legal considerations in designing and implementing electronic processes : a guide for federal agencies -- Encryption -- Intellectual property. Forensics. Forensic and security assessment tools -- How to report Internet-related crime -- Internet security : an auditor's basic checklist.
|
650 |
|
0 |
|a Computer crimes
|x Investigation
|v Handbooks, manuals, etc.
|0 http://id.loc.gov/authorities/subjects/sh85029493
|
700 |
1 |
|
|a Marcella, Albert J.
|0 http://id.loc.gov/authorities/names/n91089426
|
700 |
1 |
|
|a Greenfield, Robert S.,
|d 1961-
|0 http://id.loc.gov/authorities/names/n2001091138
|
907 |
|
|
|y .b3939427x
|b 211114
|c 020906
|
998 |
|
|
|a mn
|b 030106
|c m
|d a
|e -
|f eng
|g flu
|h 0
|i 2
|
994 |
|
|
|a E0
|b EEM
|
999 |
f |
f |
|i f532d499-e0de-5616-9200-d204899f5f4b
|s 0d8be98a-dc76-55b8-9fca-829c4de9e9d6
|t 0
|
952 |
f |
f |
|p Can Circulate
|a Michigan State University-Library of Michigan
|b Michigan State University
|c MSU Main Library
|d MSU Main Library
|t 0
|e HV8079.C65 C93 2002
|h Library of Congress classification
|i Printed Material
|m 31293021428754
|n 1
|