SCE Library
  • Lists
    Public lists PGDE Programme PgCCP PgCHE M.Ed (Science) New Books on Mindfulness New List Books donated by Bhutan Society for the UK Trust Fund Books Donated by Consulate General of India Phuentsholing PGCERT New List 2023 View all
    Your lists Log in to create your own lists
  • Log in to your account
  • Your cookies
  • Search history
  • Clear

About Us
Library Rules
Membership
Collection
Code of Conduct
  • Advanced search
  • Course reserves
  • Tag cloud
  • Libraries
  • Log in to your account

    1. Home
    2. MARC view: Introductory Computer Forensics
    Normal view MARC view ISBD view

    Introductory Computer Forensics (Record no. 17671)

    [ view plain ]
    MARC details
    000 -LEADER
    fixed length control field 04223nam a22005295i 4500
    001 - CONTROL NUMBER
    control field 978-3-030-00581-8
    003 - CONTROL NUMBER IDENTIFIER
    control field DE-He213
    005 - DATE AND TIME OF LATEST TRANSACTION
    control field 20200712165714.0
    007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
    fixed length control field cr nn 008mamaa
    008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
    fixed length control field 181110s2018 gw | s |||| 0|eng d
    020 ## - INTERNATIONAL STANDARD BOOK NUMBER
    International Standard Book Number 9783030005818
    -- 978-3-030-00581-8
    024 7# - OTHER STANDARD IDENTIFIER
    Standard number or code 10.1007/978-3-030-00581-8
    Source of number or code doi
    050 #4 - LIBRARY OF CONGRESS CALL NUMBER
    Classification number QA76.9.A25
    072 #7 - SUBJECT CATEGORY CODE
    Subject category code UR
    Source bicssc
    072 #7 - SUBJECT CATEGORY CODE
    Subject category code COM053000
    Source bisacsh
    072 #7 - SUBJECT CATEGORY CODE
    Subject category code UR
    Source thema
    082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
    Classification number 005.8
    Edition number 23
    100 1# - MAIN ENTRY--PERSONAL NAME
    Personal name Lin, Xiaodong.
    Relator term author.
    Relator code aut
    -- http://id.loc.gov/vocabulary/relators/aut
    245 10 - TITLE STATEMENT
    Title Introductory Computer Forensics
    Medium [electronic resource] :
    Remainder of title A Hands-on Practical Approach /
    Statement of responsibility, etc by Xiaodong Lin.
    250 ## - EDITION STATEMENT
    Edition statement 1st ed. 2018.
    264 #1 -
    -- Cham :
    -- Springer International Publishing :
    -- Imprint: Springer,
    -- 2018.
    300 ## - PHYSICAL DESCRIPTION
    Extent XXIII, 577 p. 459 illus., 347 illus. in color.
    Other physical details online resource.
    336 ## -
    -- text
    -- txt
    -- rdacontent
    337 ## -
    -- computer
    -- c
    -- rdamedia
    338 ## -
    -- online resource
    -- cr
    -- rdacarrier
    347 ## -
    -- text file
    -- PDF
    -- rda
    505 0# - FORMATTED CONTENTS NOTE
    Formatted contents note 1 Introduction to Computer Forensics -- 2 Introduction to Computer Organization -- 3 Building a Forensics Workstation -- 4 Volume Analysis -- 5 Examining FAT File System -- 6 Deleted File Recovery in FAT -- 7 Examining NTFS File System -- 8 Deleted File Recovery in NTFS -- 9 File Carving -- 10 File Signature Searching Forensics -- 11 Keyword Forensics -- 12 Timeline Analysis -- 13 Data Hiding and Detection -- 14 Log Analysis -- 15 Android Forensics -- 16 GPS Forensics -- 17 SIM Cards Forensics -- 18 Introductory Malware Analysis -- 19 Ransomware Analysis -- 20 Image Forgery Detection -- 21 Steganography and Steganalysis.
    520 ## - SUMMARY, ETC.
    Summary, etc This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book. .
    650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Data protection.
    650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Forensic science.
    650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Computer crimes.
    650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Computer security.
    650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Multimedia information systems.
    650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Security.
    -- http://scigraph.springernature.com/things/product-market-codes/I28000
    650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Forensic Science.
    -- http://scigraph.springernature.com/things/product-market-codes/B23000
    650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Cybercrime.
    -- http://scigraph.springernature.com/things/product-market-codes/1B7000
    650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Systems and Data Security.
    -- http://scigraph.springernature.com/things/product-market-codes/I28060
    650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
    Topical term or geographic name as entry element Multimedia Information Systems.
    -- http://scigraph.springernature.com/things/product-market-codes/I18059
    710 2# - ADDED ENTRY--CORPORATE NAME
    Corporate name or jurisdiction name as entry element SpringerLink (Online service)
    773 0# - HOST ITEM ENTRY
    Title Springer eBooks
    776 08 - ADDITIONAL PHYSICAL FORM ENTRY
    Display text Printed edition:
    International Standard Book Number 9783030005801
    776 08 - ADDITIONAL PHYSICAL FORM ENTRY
    Display text Printed edition:
    International Standard Book Number 9783030005825
    856 40 - ELECTRONIC LOCATION AND ACCESS
    Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a>
    912 ## -
    -- ZDB-2-SCS
    942 ## - ADDED ENTRY ELEMENTS (KOHA)
    Koha item type

    No items available.

    • Print
    • Save record
      BIBTEX Dublin Core MARCXML MARC (non-Unicode/MARC-8) MARC (Unicode/UTF-8) MARC (Unicode/UTF-8, Standard) MODS (XML) RIS
    • More searches
      Search for this title in:
      Other Libraries (WorldCat) Other Databases (Google Scholar) Online Stores (Bookfinder.com) ebook (library genesis)

    Exporting to Dublin Core...




    Maintained by Academic Resource Center, Samtse College of Education