Computer forensics (Record no. 192225)

MARC details
000 -LEADER
fixed length control field 01858cam a2200301 i 4500
001 - CONTROL NUMBER
control field 17993702
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240902020010.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140110s2015 mauak b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013048189
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781449692223
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
042 ## - AUTHENTICATION CODE
Authentication code pcc
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number KF8947.5
Item number .M37 2015
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Maras, Marie-Helen
9 (RLIN) 29913
245 10 - TITLE STATEMENT
Title Computer forensics
Remainder of title cybercriminals, laws, and evidence
250 ## - EDITION STATEMENT
Edition statement 2nd
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington
Name of publisher, distributor, etc Bartlett Learning Publication
Date of publication, distribution, etc 2015
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Entering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile devices in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Koha item type Home library Current library Shelving location Full call number Barcode Total Checkouts Date last seen Date checked out
    Dewey Decimal Classification     General Books Print OPJGU Sonepat- Campus OPJGU Sonepat- Campus Main Library 363.259680973 MA-C 132110 1 04/09/2024 01/09/2024

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library