LEADER 01299nam0-22004091i-450 001 990007204060403321 005 20191018125101.0 035 $a000720406 035 $aFED01000720406 035 $a(Aleph)000720406FED01 035 $a000720406 100 $a20021021d1980----km-y0itay50------ba 101 1 $aita$ceng 102 $aIT 200 1 $a<>contesa industriale$econtrattazione, conflitto e potere nella scuola di Oxford$fH. A. Clegg, Allan Flanders, Alan Fox$gintroduzione di Gian Primo Cella$gtraduzioni di Eugenia e Giancarlo Monterisi 210 $aRoma$cEdizioni Lavoro$d©1980 215 $axiv, 134 p.$d21 cm 225 1 $aClassici e contemporanei$v3 610 0 $aRelazioni industriali$aAspetti sociali 676 $a306.34$v21$zita 676 $a331$v21$zita 700 1$aClegg,$bHugh Armstrong$f<1920-1995>$0249860 701 1$aFlanders,$bAllan$0147321 701 1$aFox,$bAlan$0183371 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007204060403321 952 $aDPR 28-538$b8156$fDEC 952 $aC-II-46$b132 dip.$fDDRC 952 $a306.34 CLE 1$b2621$fBFS 952 $aTT 414$b1216$fDDCIC 959 $aDEC 959 $aDDRC 959 $aBFS 959 $aDDCIC 996 $aContesa industriale$9688989 997 $aUNINA LEADER 05550nam 2200685Ia 450 001 9910453400903321 005 20200520144314.0 010 $a1-281-76292-X 010 $a9786611762926 010 $a0-08-055881-X 035 $a(CKB)1000000000547784 035 $a(EBL)405426 035 $a(OCoLC)476222837 035 $a(SSID)ssj0000256425 035 $a(PQKBManifestationID)11219980 035 $a(PQKBTitleCode)TC0000256425 035 $a(PQKBWorkID)10235059 035 $a(PQKB)10748145 035 $a(MiAaPQ)EBC405426 035 $a(CaSebORM)9781597492232 035 $a(Au-PeEL)EBL405426 035 $a(CaPaEBR)ebr10254665 035 $a(CaONFJC)MIL176292 035 $a(EXLCZ)991000000000547784 100 $a20080111d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aTechno security's guide to e-discovery and digital forensics$b[electronic resource] /$fJack Wiles, lead author ; Tammy Alexander ... [et al.] 205 $a1st edition 210 $aBurlington, Mass. $cSyngress Publishing$dc2007 215 $a1 online resource (434 p.) 300 $a"A comprehensive handbook for investigators, examiners, IT security managers, lawyers, and academia". 300 $aIncludes index. 311 $a1-59749-223-X 327 $aCover; Contents; Foreword; Chapter 1: Authentication: Are You Investigating the Right Person?; Introduction; Authentication: What Is It?; An Authentication War Story from 20 Years Ago: The Outside Job; A Second Authentication War Story; Let's Do Something about This Authentication Problem; A Third Authentication War Story; Security Threats in the Future; The Inside Job; A Final Authentication War Story; Key Loggers 101; Some 21st Century Solutions to Authentication; Security Awareness Training; The Rest of the Book; Chapter 2: Digital Forensics: An Overview; Introduction 327 $aDigital Forensic PrinciplesDigital Environments; Digital Forensic Methodologies; Chapter 3: Working with Other Agencies; Introduction; Building the Relationship; Building Your Package of Information; Don't Shop Your Cases; A Discussion of Agencies; The Big Two: The U.S. Secret Service and the FBI; Other Federal Cyber Crime Investigations Agencies; Chapter 4: Developing an Enterprise Digital Investigative/ Electronic Discovery Capability; Introduction; Identifying Requirements for an Enterprise Digital Investigative/ Electronic Discovery Capability 327 $aAdministrative Considerations for an Enterprise Digital Investigative/Electronic Discovery CapabilityIdentifying Resources (Software/Hardware/Facility) for Your Team; Chapter 5: Forensic Examination in a Terabyte World; Introduction; Volume Challenges; Network and Hardware Challenges; Future Digital Forensic Solutions; The FTK 2.x Model; Chapter 6: Selecting Equipment for a Computer Forensic Laboratory; Introduction; Forensic Workstations for the Laboratory; Forensic Workstations for the Mobile or Field Laboratory; Hardware Write-Protection Devices; Data Storage; Miscellaneous Items 327 $aChapter 7: Integrating a Quality Management System in a Digital Forensic LaboratoryIntroduction; Quality Planning, Quality Reviews, and Continuous Quality Improvement; Other Challenges: Ownership, Responsibility, and Authority; Chapter 8: Balancing E-discovery Challenges with Legal and IT Requirements; Introduction; Drivers of E-discovery Engineering; Locations, Forms, and Preservation of Electronically Stored Information; Legal and IT Team Considerations for Electronic Discovery; Are You Litigation Ready?; E-discovery Tools; Chapter 9: E-mail Forensics; Introduction; Where to Start 327 $aForensic AcquisitionProcessing Local Mail Archives; Chapter 10: Murder and Money: The Story of Standards, Accreditation, and Certification in Computer Forensics; Introduction; Standards; Accreditation; Certification; Rough Beginnings; Money to the Rescue; Standards and Computer Forensics; Certification Options for the Digital Evidence Analyst; Another Standards Option; Chapter 11: Starting a Career in the Field of Techno Forensics; Introduction; Occupations; Professional Organizations; Professional Certifications; Degree Programs 327 $aAppendix A: Death by a Thousand Cuts By Johnny Long with Anthony Kokocinski 330 $aThis book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market w 606 $aComputer crimes$xInvestigation 606 $aComputer networks$xSecurity measures 606 $aComputer security 608 $aElectronic books. 615 0$aComputer crimes$xInvestigation. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 676 $a363.25/968 700 $aWiles$b Jack$01050402 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453400903321 996 $aTechno security's guide to e-discovery and digital forensics$92480144 997 $aUNINA LEADER 01039nam a22002651i 4500 001 991002333599707536 005 20040304164128.0 008 040407s1959 it |||||||||||||||||ita 035 $ab12906724-39ule_inst 035 $aARCHE-088634$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a382 100 1 $aSabella, Domenico$0486492 245 12$aL'Europa e il Mezzogiorno /$cdi Domenico Sabella ; con interventi di Hans Furler ... [et al.] 260 $aRoma :$bEditor. di cultura e di documentazione,$c1959 300 $a181 p. ;$c22 cm 440 0$aQuaderni di Prospettive meridionali ;$v5 650 4$aComunità economica europea 700 1 $aFurler, Hans 907 $a.b12906724$b02-04-14$c16-04-04 912 $a991002333599707536 945 $aLE009 GEOG.14-195$g1$i2009000381735$lle009$o-$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i13474285$z16-04-04 996 $aEuropa e il Mezzogiorno$9305785 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$fita$git $h2$i1