LEADER 05881nam 2200853Ia 450 001 9910964667403321 005 20200520144314.0 010 $a9786613374523 010 $a9781283374521 010 $a1283374528 010 $a9781118067574 010 $a1118067576 035 $a(CKB)3400000000021253 035 $a(EBL)661659 035 $a(OCoLC)729355303 035 $a(SSID)ssj0000611554 035 $a(PQKBManifestationID)11385287 035 $a(PQKBTitleCode)TC0000611554 035 $a(PQKBWorkID)10645942 035 $a(PQKB)11233269 035 $a(WaSeSS)Ind00023300 035 $a(Au-PeEL)EBL661659 035 $a(CaPaEBR)ebr10510709 035 $a(CaONFJC)MIL337452 035 $a(OCoLC)781716269 035 $a(OCoLC)ocn781716269 035 $a(CaSebORM)9781118067659 035 $a(MiAaPQ)EBC661659 035 $a(Perlego)1011234 035 $a(EXLCZ)993400000000021253 100 $a20100914d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComputer Forensics jumpstart /$fMichael G. Solomon ... [et al.] 205 $a2nd ed. 210 $aIndianopolis, IN $cWiley$dc2011 215 $a1 online resource (338 p.) 225 1 $aSybex Serious Skills 300 $aDescription based upon print version of record. 311 08$a9781118067659 311 08$a1118067657 311 08$a9780470931660 311 08$a0470931663 320 $aIncludes bibliographical references and index. 327 $aComputer Forensics JumpStart, Second Edition; Acknowledgments; About the Authors; Contents; Introduction; Who Should Read This Book; What This Book Covers; Making the Most of This Book; How to Contact the Authors; Chapter 1: The Need for Computer Forensics; Defining Computer Forensics; Computer Crime in Real Life; Corporate versus Law Enforcement Concerns; Training; What Are Your Organizations's Needs?; Terms to Know; Review Questions; Chapter 2: Preparation-What to Do Before You Start; Know Your Hardware; Know Your Operating System; Know Your Limits; Develop Your Incident Response Team 327 $aTerms to KnowReview Questions; Chapter 3: Computer Evidence; What Is Computer Evidense?; Search and Seizure; Chain of Custody; Admissibility of Evidence in a Court of Law; Leave No Trace; Terms to Know; Review Questions; Chapter 4: Common Tasks; Evidence Identification; Evidence Preservation; Evidence Analysis; Evidence Presentation; Terms to Know; Review Questions; Chapter 5: Capturing the Data Image; The Imaging Process; Partial Volume Images; Working with Virtual Machines; Imaging/Capture Tools; Terms to Know; Review Questions; Chapter 6: Extracting Information from Data 327 $aWhat Are You Looking For?How People Think; Picking the Low-Hanging Fruit; Hidden Evidence; Trace Evidence; Terms to Know; Review Questions; Chapter 7: Passwords and Encryption; Passwords; Encryption Basics; Common Encryption Packages; Strengths and Weaknesses of Encryption; Handling Encrypted Data; Terms to Know; Review Questions; Chapter 8: Common Forensic Tools; Disk Imaging and Validation Tools; Forensic Tools; Your Forensic Toolkit; Terms to Know; Review Questions; Chapter 9: Pulling It All Together; Creating East-to-Use Reports; Document Everything, Assume Nothing; Formulating the Report 327 $aSample Analysis ReportsUsing Software to Generate Reports; Terms to Know; Review Questions; Chapter 10: How to Testify in Court; Preparation Is Everything; Appearance Matters; What Matters Is What They Hear; Know Your Forensic Process and Tools; Say Only What You Must; Keep It Simple; Be Ready to Justify Every Step; Summary; Terms to Know; Review Questions; Appendix A: Answers to Review Questions; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Appendix B: Forensic Resources; Information; Organizations; Publications; Services 327 $aSoftwareHardware; Traininig; Appendix C: Forensic Certifications and More; AccessData Certified Examiner (ACE); Advanced Information Security (AIS); Certified Computer Examiner (CCE); Certified Hacking Forensic Investigator (CHFI); Certified Forensic Computer Examiner (CFCE); Certified Information Systems Auditor (CISA); Certified ProDiscover Examiner (CPE); EnCase Certified Examiner Program; GIAC Certified Forensic Analyst (GCFA); GIAC Certified Forensics Examiner (GCFE); Professional Certified Investigator (PCI); ASCLD/LAB Accreditation; Licensure; Appendix D: Forensic Tools 327 $aForesnsic Tools Suites 330 $aEssential reading for launching a career in computer forensics Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the r 410 0$aSerious skills. 517 3 $aJumpStart 606 $aComputer security 606 $aComputer networks$xSecurity measures 606 $aComputer crimes$xInvestments 606 $aForensic sciences 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer crimes$xInvestments. 615 0$aForensic sciences. 676 $a005.8 676 $a363.25968 701 $aSolomon$b Michael R$0222905 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910964667403321 996 $aComputer Forensics jumpstart$94353202 997 $aUNINA LEADER 02897nam0 22004331i 450 001 UON00198607 005 20231205103243.116 100 $a20030730g17891790 |0itac50 ba 101 $aita 102 $aIT 140 $a|||||||||z ||||||||| 200 1 $aCodice Diplomatico di Sicilia sotto il Governo degli Arabi / Alfonso Airoldi 210 $aPalermo$cReale Stamperia$d 1789 215 $a2 v. in 4 tomi$d 24 cm. 317 $aProvenienza: Biblioteca Provinciale di Napoli (1874-1925)$5IT-UONSI ANTA XVIII/0077/Tomo 1 317 $aProvenienza: Biblioteca Provinciale di Napoli (1874-1925)$5IT-UONSI ANTA XVIII/0077/Tomo 2 317 $aProvenienza: Biblioteca Provinciale di Napoli (1874-1925)$5IT-UONSI ANTA XVIII/0077/Tomo 3 317 $aProvenienza: Biblioteca Provinciale di Napoli (1874-1925)$5IT-UONSI ANTA XVIII/0077/Tomo 4 318 $aStato di conservazione: Estramamente rovinato$5IT-UONSI ANTA XVIII/0077/Tomo 1 318 $aStato di conservazione: Estramamente rovinato$5IT-UONSI ANTA XVIII/0077/Tomo 2 318 $aStato di conservazione: Estramamente rovinato$5IT-UONSI ANTA XVIII/0077/Tomo 3 318 $aStato di conservazione: Estramamente rovinato$5IT-UONSI ANTA XVIII/0077/Tomo 4 620 $aIT$dPalermo$3UONL000273 700 1$aAiroldi$bAlfonso$3UONV118307$0679575 712 $aReale Stamperia$3UONV266817$4650 712 02$aBiblioteca Provinciale di Napoli (1874-1925)$3UONV295398$4320$5IT-UONSI ANTA XVIII/0077/Tomo 1 712 02$aBiblioteca Provinciale di Napoli (1874-1925)$3UONV295398$4320$5IT-UONSI ANTA XVIII/0077/Tomo 2 712 02$aBiblioteca Provinciale di Napoli (1874-1925)$3UONV295398$4320$5IT-UONSI ANTA XVIII/0077/Tomo 3 712 02$aBiblioteca Provinciale di Napoli (1874-1925)$3UONV295398$4320$5IT-UONSI ANTA XVIII/0077/Tomo 4 801 $aIT$bSOL$c20250718$gRICA 856 4 $uhttp://next.unior.it/sebina/repository/catalogazione/documenti/330 unito.compressed.pdf$z330 unito.compressed.pdf 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI$uhttp://next.unior.it/sebina/repository/catalogazione/documenti/330 unito.compressed.pdf 912 $aUON00198607 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI A XVIII 0077/Tomo 1 $eSI MR 67778 7 0077/Tomo 1 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI A XVIII 0077/Tomo 2 $eSI MR 67778/1 7 0077/Tomo 2 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI A XVIII 0077/Tomo 3 $eSI MR 67778/2 7 0077/Tomo 3 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI A XVIII 0077/Tomo 4 $eSI MR 67778/3 7 0077/Tomo 4 996 $aCodice Diplomatico di Sicilia sotto il Governo degli Arabi$91253326 997 $aUNIOR