000 01578nam a2200253Ia 4500
003 NULRC
005 20250520100601.0
008 250520s9999 xx 000 0 und d
020 _a9780470931660
040 _cNULRC
050 _aQA 76.9.A25 .C65 2011
100 _aSolomon, Michael G.
_eauthor
245 0 _aComputer forensics jumpstart /
_cMichael G. Solomon, K. Rudolph, Ed Tittle [and others].
250 _aSecond edition.
260 _aIndianapolis, Indiana :
_bWiley Publishing Incorporation,
_cc2011
300 _axx, 316 pages :
_billustrations ;
_c24 cm.
365 _bPHP1917
504 _aIncludes bibliographical references and index.
505 _aThe need for computer forensics -- Preparation -- what to do before you start -- Computer evidence -- Common tasks -- Capturing the data image -- Extracting information from data -- Passwords and encryption -- Common forensics tools -- Pulling it all together -- How to testify in court -- Appendix A: answers to review questions -- Appendix B: forensics resources -- Appendix C: forensics certifications -- Appendix D: forensics tools.
520 _aAnnotation Computer forensics is a broad field that encompasses such disciplines as: network intrusion detection; computer media analysis for criminal, fraud and counterintelligence investigations; evidence seizure and crime scene analysis; and high-level system security design and maintenance.
650 _aCOMPUTER SECURITY
700 _aRudolph K,;Tittel, Ed ;Broom, Neil;Barrett, Diane
_eco-author;co-author;co-author;co-author
942 _2lcc
_cBK
999 _c8633
_d8633