Introductory computer forensics : (Record no. 6415)

MARC details
000 -LEADER
fixed length control field 03781nam a22003377a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240110191612.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210923b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030005818
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030005801
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Edition number 23
Item number LIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lin, Xiaodong,
Relator term author.
245 10 - TITLE STATEMENT
Title Introductory computer forensics :
Remainder of title a hands-on practical approach /
Statement of responsibility, etc. Xiaodong Lin.
250 ## - EDITION STATEMENT
Edition statement 1st edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer International Publishing :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice c2018.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 577 p. :
Other physical details ill.(some col.) ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note CONTENTS<br/><br/><br/>1 Introduction to Computer Forensics <br/>introduction<br/>what computer forensics is and why it is important<br/>digital evidence<br/>e.tc<br/><br/>2 Introduction to Computer Organization <br/>computer organizations<br/>data representation<br/>memory alignment and byte ordering<br/>e.tc<br/><br/>3 Building a Forensics Workstation <br/>The Sleuth Kit (TSK) and autopsy forensic browser<br/>virtualization<br/>building up your forensics workstation with Kali Linux<br/>e.tc<br/><br/>4 Volume Analysis <br/>Hard disk geometry and disk partitioning<br/>Volume analysis<br/>practice analysis<br/>e.tc<br/><br/>5 Examining FAT File System <br/>file system overview<br/>FAT file systems<br/>Lab exercises<br/>e.tc<br/><br/>6 Deleted File Recovery in FAT <br/>Principles of file recovery<br/>file creation and deletion in FAT file systems<br/>deleted file recovery in FAT file systems<br/>e.tc<br/><br/>7 Examining NTFS File System <br/>new technology file system<br/>The master file table<br/>NTFS indexing<br/>e.tc<br/><br/>8 Deleted File Recovery in NTFS <br/>NTFS deleted files recovery<br/>Practical exercise<br/>references<br/><br/>9 File Carving <br/>Principles of file carving<br/>file carving tools<br/>practical exercise<br/>etc<br/><br/>10 File Signature Searching Forensics <br/>Introduction<br/>File signature search process<br/>file signature search using hfind<br/>e.tc<br/><br/>11 Keyword Forensics <br/>Forensic keyword searching process<br/>Grep and regular expressions<br/>case study<br/>e.tc<br/><br/>12 Timeline Analysis <br/>principle of timeline analysis<br/>timeline analysis process<br/>forensic timeline analysis tools<br/>e.tc<br/><br/>13 Data Hiding and Detection <br/>Data hiding fundamentals<br/>data hiding and detection in office open XML<br/>Practical exercise<br/>e.tc<br/><br/>14 Log Analysis <br/>system log analysis<br/>security information and event management system<br/>implementing SIEM<br/>E.tc<br/><br/>15 Android Forensics <br/>mobile phone fundamentals<br/>mobile device forensic investigation<br/>practice exercise<br/>e.tc<br/><br/>16 GPS Forensics <br/>The GPS system<br/>GPS evidentiary data<br/>case study<br/>e.tc<br/><br/>17 SIM Cards Forensics <br/>The subscribe identification module (SIM)<br/>SIM architecture<br/>Security<br/>evidence extraction<br/>e.tc<br/><br/>18 Introductory Malware Analysis <br/>Malware viruses and worms<br/>essential skills and tools for malware analysis<br/>list of malware analysis tools and techniques<br/>e.tc<br/><br/>19 Ransomware Analysis <br/>patterns of ransomware<br/>notorious ransomware<br/>e.tc<br/><br/>20 Image Forgery Detection <br/>digital image processing fundamentals<br/>image forgery detection<br/>practice exercise<br/><br/><br/>21 Steganography and Steganalysis.<br/>steganography and steganalysis basis<br/>steganography techniques and steganography tools<br/>e.tc<br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes Bibliographic references
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher-supplied MARC data.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Forensic science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Multimedia information systems.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title Introductory computer forensics : a hands-on practical approach
International Standard Book Number 9783030005801
Record control number (DLC) 2018957125
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783030005801
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783030005825
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Edition 1st edition.
Classification part 364.168
Item part 1
Call number prefix LIN
Call number suffix 364.168 LIN
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 09/23/2021 Purchased 0027686   364.168 LIN 1 BUML24010170 09/23/2021 1 09/23/2021 Book Closed Access