LEADER 01293nam 2200361 450 001 9910299868303321 005 20200116143854.0 010 $a818555787X 010 $a9788185557878 035 $a(EXLCZ)9911761514100041 100 $a20190109e19931916 uy 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cn$2rdamedia 183 $anc$2rdacarrier 200 12$aA dictionary of the Ka?shmi?ri? language $ecompiled partly from materials left by the late Pandit Is?vara Kaula /$fby Sir George A. Grierson ; assisted by Mukundara?ma S?a?stri?, of S?ri?nagar 205 $aReproduced edition 210 1$aDelhi :$cLow Price Publications,$d[1993]. 210 2$aDelhi :$cD.K. Publishers' Distributors,$d[1993]. 210 4$dİ1916-1932. 215 $a1 online recourse (xxiii, 1252 pages) 606 $aKashmiri language$vDictionaries$xEnglish 608 $aDictionaries.$2fast 615 7$aKashmiri language$xEnglish. 676 $a491/.499 700 $aGrierson$b George Abraham$cSir,$f1851-1941$0640972 702 $aS?a?stri?$b Mukundara?ma 702 $aKaula$b I?s?vara$f1833-1893. 801 0$bIL4I4 912 $a9910299868303321 996 $aA dictionary of the Ka?shmi?ri? language$92121501 997 $aUNINA 999 $aEBOOK LEADER 02634nam 2200625 a 450 001 9910462412103321 005 20200520144314.0 010 $a1-118-72161-6 010 $a1-118-23608-4 010 $a1-280-68532-8 010 $a9786613662262 010 $a1-118-22614-3 035 $a(CKB)2670000000206233 035 $a(EBL)818114 035 $a(OCoLC)795119901 035 $a(SSID)ssj0000691312 035 $a(PQKBManifestationID)11414140 035 $a(PQKBTitleCode)TC0000691312 035 $a(PQKBWorkID)10630209 035 $a(PQKB)10320388 035 $a(MiAaPQ)EBC818114 035 $a(CaSebORM)9781118236086 035 $a(Au-PeEL)EBL818114 035 $a(CaPaEBR)ebr10580157 035 $a(CaONFJC)MIL366226 035 $a(EXLCZ)992670000000206233 100 $a20111215d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aMastering windows network forensics and investigation$b[electronic resource] /$fSteve Anson ... [et al.] 205 $a2nd ed. 210 $aIndianapolis $cJohn Wiley & Sons$d2012 215 $a1 online resource (698 p.) 225 0 $aSybex serious skills. Mastering Windows network forensics and investigation 300 $aIncludes index. 311 $a1-118-16382-6 327 $apt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices. 330 $aAn authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or networ 606 $aComputer crimes$xInvestigation 606 $aComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aComputer crimes$xInvestigation. 615 0$aComputer networks$xSecurity measures. 676 $a363.25968 701 $aAnson$b Steve$0853287 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462412103321 996 $aMastering windows network forensics and investigation$91905277 997 $aUNINA