LEADER 01451nam 2200469 450 001 9910453374603321 005 20200520144314.0 010 $a1-78166-799-3 035 $a(CKB)2550000001216792 035 $a(StDuBDS)AH24100949 035 $a(SSID)ssj0001502714 035 $a(PQKBManifestationID)11861161 035 $a(PQKBTitleCode)TC0001502714 035 $a(PQKBWorkID)11458173 035 $a(PQKB)11584819 035 $a(MiAaPQ)EBC4460728 035 $a(Au-PeEL)EBL4460728 035 $a(CaPaEBR)ebr11260835 035 $a(OCoLC)815429337 035 $a(EXLCZ)992550000001216792 100 $a20160928h20122012 ay| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe adventures of Ulysses /$fby Charles Lamb 210 1$a[Luton, Bedfordshire] :$cAndrews UK Limited,$d[2012] 210 4$dİ2012 215 $a1 online resource (94 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 330 $bA fantastic collection of legends about the Greek king of Ithaca, Odysseus, also known by his Latin name of Ulysses, written by English essayist Charles Lamb. 608 $aElectronic books. 676 $a398.22 700 $aLamb$b Charles$0163708 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453374603321 996 $aThe adventures of Ulysses$91963034 997 $aUNINA LEADER 04429nam 22006495 450 001 9910299351603321 005 20251116204034.0 010 $a3-030-00581-X 024 7 $a10.1007/978-3-030-00581-8 035 $a(CKB)4100000007127561 035 $a(DE-He213)978-3-030-00581-8 035 $a(MiAaPQ)EBC6312389 035 $a(PPN)232474257 035 $a(EXLCZ)994100000007127561 100 $a20181110d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntroductory Computer Forensics $eA Hands-on Practical Approach /$fby Xiaodong Lin 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XXIII, 577 p. 459 illus., 347 illus. in color.) 311 08$a3-030-00580-1 327 $a1 Introduction to Computer Forensics -- 2 Introduction to Computer Organization -- 3 Building a Forensics Workstation -- 4 Volume Analysis -- 5 Examining FAT File System -- 6 Deleted File Recovery in FAT -- 7 Examining NTFS File System -- 8 Deleted File Recovery in NTFS -- 9 File Carving -- 10 File Signature Searching Forensics -- 11 Keyword Forensics -- 12 Timeline Analysis -- 13 Data Hiding and Detection -- 14 Log Analysis -- 15 Android Forensics -- 16 GPS Forensics -- 17 SIM Cards Forensics -- 18 Introductory Malware Analysis -- 19 Ransomware Analysis -- 20 Image Forgery Detection -- 21 Steganography and Steganalysis. 330 $aThis textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book?s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students? understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book. . 606 $aData protection 606 $aForensic sciences 606 $aComputer crimes 606 $aComputer security 606 $aMultimedia systems 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aForensic Science$3https://scigraph.springernature.com/ontologies/product-market-codes/B23000 606 $aCybercrime$3https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aMultimedia Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I18059 615 0$aData protection. 615 0$aForensic sciences. 615 0$aComputer crimes. 615 0$aComputer security. 615 0$aMultimedia systems. 615 14$aSecurity. 615 24$aForensic Science. 615 24$aCybercrime. 615 24$aSystems and Data Security. 615 24$aMultimedia Information Systems. 676 $a363.252 676 $a364.168 700 $aLin$b Xiaodong$4aut$4http://id.loc.gov/vocabulary/relators/aut$0881835 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299351603321 996 $aIntroductory Computer Forensics$92123477 997 $aUNINA