LEADER 01517oam 2200373 a 450 001 9910700852303321 005 20240812220856.0 035 $a(CKB)5470000002412494 035 $a(OCoLC)83915990 035 $a(EXLCZ)995470000002412494 100 $a20070215d2006 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aGuide to integrating forensic techniques into incident response $erecommendations of the National Institute of Standards and Technology /$fby Karen Kent ... [and others] 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,$d[2006] 215 $a1 online resource (121 unnumbered pages) $ccolor illustrations 225 1 $aNIST special publication ;$v800-86.$aComputer security 300 $aTitle from title screen (NIST, viewed Feb. 15, 2007). 300 $a"August 2006." 320 $aIncludes bibliographical references (page E-1) and index. 517 $aGuide to integrating forensic techniques into incident response 606 $aComputer crimes$xInvestigation$xStandards$zUnited States 615 0$aComputer crimes$xInvestigation$xStandards 701 $aScarfone$b Karen$01764277 801 0$bDST 801 1$bDST 801 2$bGPO 906 $aBOOK 912 $a9910700852303321 996 $aGuide to integrating forensic techniques into incident response$94205746 997 $aUNINA