000012901 000__ 03195cam\a2200637\i\4500 000012901 001__ 12901 000012901 003__ SzGeWIPO 000012901 005__ 20210318092546.0 000012901 008__ 020809s2002\\\\maua\\\\rb\\\u001\0\fre\d 000012901 020__ $$a0201707195 000012901 020__ $$z9780672333989 000012901 020__ $$z0672333988 000012901 020__ $$z9780201707199 000012901 020__ $$z9781282692022 000012901 020__ $$z128269202X 000012901 020__ $$z9786612692024 000012901 020__ $$z6612692022 000012901 020__ $$z020171499X 000012901 020__ $$z9780201714999 000012901 035__ $$a(wipo)(CD )02-0524 000012901 035__ $$a(OCoLC)52815421 000012901 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000012901 050_4 $$aQA76.9.A25$$bK78 2001 000012901 08204 $$a005.8$$221 000012901 08204 $$a363.25968$$221 000012901 084__ $$aD 710 KRU.C 000012901 090__ $$c13488$$d13488 000012901 1001_ $$aKruse, Warren G.,$$eauthor. 000012901 24510 $$aComputer forensics :$$bincident response essentials /$$cWarren G. Kruse II, Jay G. Heiser. 000012901 264_1 $$aBoston, Mass. :$$bAddison-Wesley,$$cc2002. 000012901 300__ $$axiii, 398 pages :$$billustrations ;$$c24 cm 000012901 336__ $$atext$$btxt$$2rdacontent 000012901 337__ $$aunmediated$$bn$$2rdamedia 000012901 338__ $$avolume$$bnc$$2rdacarrier 000012901 504__ $$aIncludes bibliographical references (pages 381-384) and index. 000012901 5050_ $$aIntroduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system. 000012901 5201_ $$a"Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered." "Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography."--Jacket. 000012901 650_0 $$aInformation technology$$xSecurity measures. 000012901 650_0 $$aComputer networks$$xSecurity measures. 000012901 650_0 $$aComputer security. 000012901 650_0 $$aComputer networks. 000012901 650_0 $$aForensic sciences. 000012901 650_0 $$aData protection. 000012901 650_0 $$aComputer crimes$$xInvestigation. 000012901 650_0 $$aCopyright. 000012901 650_4 $$aENCRYPTION 000012901 650_4 $$aCOMPUTER SECURITY 000012901 650_4 $$aDIGITAL CRIME 000012901 650_4 $$aINFORMATION SCIENCE (DOCUMENTATION) : AUTOMATED INFORMATION PROCESSING TOOLS : COMPUTER SECURITY 000012901 7001_ $$aCunningham, Ward. 000012901 7001_ $$aKruse, Warren,$$eauthor. 000012901 7001_ $$aSafari, an O’Reilly Media Company. 000012901 7001_ $$aHeiser, Jay G.,$$eauthor. 000012901 903__ $$v1 000012901 942__ $$cMON 000012901 980__ $$aBIB 000012901 999__ $$c13488$$d13488