Computer forensics : (Record no. 133348)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02671cam a2200337 a 4500 |
| 001 - CONTROL NUMBER | |
| control field | ocn650217978 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251028093306.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 101203s2012 mau b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2010050880 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) i9781449600723 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Language of cataloging | eng |
| Transcribing agency | DLC |
| Modifying agency | BTCTA |
| -- | YDXCP |
| -- | BWX |
| -- | CDX |
| -- | EDK |
| -- | IAD |
| -- | MNY |
| -- | ZAD |
| -- | GTA |
| -- | OCLCF |
| -- | VF$ |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781449600723 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1449600727 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)650217978 |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 043 ## - GEOGRAPHIC AREA CODE | |
| Geographic area code | n-us--- |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | KF 8947.5 .M37 2012 |
| 049 ## - LOCAL HOLDINGS (OCLC) | |
| Holding library | VF$A |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Maras, Marie-Helen, |
| Dates associated with a name | 1979- |
| 245 10 - TITLE STATEMENT | |
| Title | Computer forensics : |
| Remainder of title | cybercriminals, laws, and evidence / |
| Statement of responsibility, etc. | by Marie-Helen Maras. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Sudbury, Mass. : |
| Name of publisher, distributor, etc. | Jones & Bartlett Learning, |
| Date of publication, distribution, etc. | 2012. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xiv, 368 p. ; |
| Dimensions | 23 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Entering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile phones and pdas in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Balancing technicality and legal analysis, this book enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy and administration. -- Publisher description |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Electronic evidence |
| Geographic subdivision | United States. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer crimes |
| General subdivision | Investigation |
| Geographic subdivision | United States. |
| 994 ## - | |
| -- | C0 |
| -- | VF$ |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | Storms Research Center | Storms Research Center | Main Collection | 10/28/2025 | KF 8947.5 .M37 2012 | 98647270 | 10/28/2025 | 26.49 | 10/28/2025 | Book |