CyberForensics (Record no. 2271)

MARC details
000 -LEADER
fixed length control field 03598cam a2200541Mc 4500
001 - CONTROL NUMBER
control field on1194522327
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240617071554.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200331s2010 nju ob 001 u eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781607617723
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1607617722
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781607617716
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781617797033
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1607617730
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-60761-772-3
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NLGGC
System control number 343175649
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1194522327
Canceled/invalid control number (OCoLC)707457281
040 ## - CATALOGING SOURCE
Original cataloging agency BEATB
Language of cataloging dut
Description conventions pn
Transcribing agency BEATB
Modifying agency NLGGC
-- OCLCF
-- OCLCQ
-- OCLCO
-- OCLCL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8079.C65
Item number C93 2010
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25968
Edition number 22
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 54.62
Number source bcl
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 86.42
Number source bcl
245 00 - TITLE STATEMENT
Title CyberForensics
Remainder of title Understanding Information Security Investigations
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Totowa, NJ
Name of publisher, distributor, etc. Humana Press :
-- Imprint: Humana
Date of publication, distribution, etc. 2010
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
490 0# - SERIES STATEMENT
Series statement Springers forensic laboratory science series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 3# - SUMMARY, ETC.
Summary, etc. This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years' experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
Form subdivision Case studies
General subdivision Investigation.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Legal medicine
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Applied marketing
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer science
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information systems
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element gerechtelijk onderzoek
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element e-business
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element computers
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element gerechtelijke geneeskunde
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element e-commerce
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element computerkunde
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872063
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bayuk, Jennifer
758 ## - RESOURCE IDENTIFIER
Label CyberForensics (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCFv9hC6PP93FYTxCTbgGDy
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 0# - ADDITIONAL PHYSICAL FORM ENTRY
Title CyberForensics
Record control number (NL-LeOCL)328487783
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Suppress in OPAC No
948 ## - LOCAL PROCESSING INFORMATION (OCLC); SERIES PART DESIGNATOR (RLIN)
h (OCLC) NO HOLDINGS IN GHUCC - 5 OTHER HOLDINGS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     Information Technology Botho University Botswana Botho University Botswana Open Shelves 06/06/2024 Books Botswana   363.25968 CYB BU-LIB24464 06/06/2024 2.50 06/06/2024 Books
    Dewey Decimal Classification     Information Technology Botho University Botswana Botho University Botswana Open Shelves 06/06/2024 Books Botswana   363.25968 CYB BU-LIB24463 06/17/2024 2.50 06/06/2024 Books
    Dewey Decimal Classification     Information Technology Botho University eSwatini Botho University eSwatini Open Shelves 06/25/2024 Donated by BW   363.25968 CYB BU-LIB24466 06/25/2024   06/25/2024 Books
    Dewey Decimal Classification     Information Technology Botho University eSwatini Botho University eSwatini Open Shelves 06/25/2024 Donated by BW   363.25968 CYB BU-LIB24465 06/25/2024   06/25/2024 Books

Powered by Koha