000 | 04893cam a2200889 i 4500 | ||
---|---|---|---|
001 | ocn814389964 | ||
003 | OCoLC | ||
005 | 20230823094713.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 121023s2013 nju o 001 0 eng | ||
010 | _a 2012043301 | ||
040 |
_aDLC _beng _erda _epn _cDLC _dYDXCP _dN$T _dDG1 _dCUS _dE7B _dCDX _dB24X7 _dNOC _dOCLCF _dUMI _dCOO _dDEBSZ _dUKDOC _dRECBK _dZCY _dEBLCP _dOCLCQ |
||
019 |
_a841039739 _a858283919 _a864908288 _a927507175 |
||
020 |
_a9781118235225 _q(epub) |
||
020 |
_a1118235223 _q(epub) |
||
020 |
_a9781118221419 _q(pdf) |
||
020 |
_a1118221419 _q(pdf) |
||
020 |
_a9781118259887 _q(mobipocket) |
||
020 |
_a1118259882 _q(mobipocket) |
||
020 |
_a9781118572115 _q(electronic bk.) |
||
020 |
_a1118572114 _q(electronic bk.) |
||
020 |
_z9780470932407 _q(hbk.) |
||
020 |
_z0470932406 _q(hbk.) |
||
028 | 0 | 1 |
_aEB00063096 _bRecorded Books |
029 | 1 |
_aAU@ _b000052007274 |
|
029 | 1 |
_aAU@ _b000052899022 |
|
029 | 1 |
_aAU@ _b000053294085 |
|
029 | 1 |
_aCHBIS _b010026939 |
|
029 | 1 |
_aCHVBK _b306232081 |
|
029 | 1 |
_aDEBBG _bBV041432436 |
|
029 | 1 |
_aDEBSZ _b398283524 |
|
029 | 1 |
_aDKDLA _b820120-katalog:000652072 |
|
029 | 1 |
_aNZ1 _b15351428 |
|
029 | 1 |
_aDEBBG _bBV043395140 |
|
035 |
_a(OCoLC)814389964 _z(OCoLC)841039739 _z(OCoLC)858283919 _z(OCoLC)864908288 _z(OCoLC)927507175 |
||
037 |
_aCL0500000291 _bSafari Books Online |
||
042 | _apcc | ||
050 | 0 | 0 | _aHV8079.C65 |
072 | 7 |
_aLAW _x041000 _2bisacsh |
|
082 | 0 | 0 |
_a363.25/968 _223 |
049 | _aMAIN | ||
100 | 1 | _aLaykin, Erik. | |
245 | 1 | 0 |
_aInvestigative computer forensics : _bthe practical guide for lawyers, accountants, investigators, and business / _cErik Laykin, CHFI, CEDS. |
264 | 1 |
_aHoboken : _bJohn Wiley, _c2013. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
505 | 0 | _aForeword -- Preface -- This book's setup -- Acknowledgments -- Introduction -- The glue -- A primer on computers and networks -- Computer forensic fundamentals -- Investigative fundamentals -- Index. | |
588 | 0 | _aPrint version record and CIP data provided by publisher. | |
520 | _a"Having worked with Erik on some of the most challenging computer forensic investigations during the early years of this industry's formation as well as having competed with him earnestly in the marketplace ... I can truly say that Erik is one of the unique pioneers of computer forensic investigations. He not only can distill complex technical information into easily understandable concepts, but he always retained a long, term global perspective on the relevancy of our work and on the impact of the information revolution on the social and business structures of tomorrow."--The Foreword by James Gordon, Managing Director, Navigant Consulting, Inc. | ||
520 | _aGet the knowledge you need to make informed decisions throughout the computer forensic investigation process. Investigative Computer Forensics zeroes in on a real need felt by lawyers, jurists, accountants, administrators, senior managers, and business executives around the globe: to understand the forensic investigation landscape before having an immediate and dire need for the services of a forensic investigator. Author Erik Laykin, leader and pioneer of computer forensic investigations, presents complex technical information in easily understandable concepts ... Get the knowledge you need to make tough decisions during an internal investigation or while engaging the capabilities of a computer forensic professional with the proven guidance found in Investigative Computer Forensics. | ||
650 | 0 |
_aComputer crimes _xInvestigation. |
|
650 | 0 | _aComputer security. | |
650 | 0 | _aFraud investigation. | |
650 | 0 |
_aCorporations _xCorrupt practices. |
|
650 | 4 |
_aComputer crimes _xInvestigation. |
|
650 | 4 | _aComputer security. | |
650 | 4 | _aFraud investigation. | |
650 | 4 |
_aCorporations _xCorrupt practices. |
|
650 | 7 |
_aLAW _xForensic Science. _2bisacsh |
|
650 | 7 |
_aComputer crimes _xInvestigation. _2fast _0(OCoLC)fst00872065 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aCorporations _xCorrupt practices. _2fast _0(OCoLC)fst00879825 |
|
650 | 7 |
_aFraud investigation. _2fast _0(OCoLC)fst00933803 |
|
650 | 7 |
_aComputer crimes / Investigation. _2local |
|
650 | 7 |
_aComputer security. _2local |
|
650 | 7 |
_aFraud investigation. _2local |
|
650 | 7 |
_aCorporations / Corrupt practices. _2local |
|
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aLaykin, Erik. _tInvestigative computer forensics. _dHoboken : John Wiley, 2013 _z9780470932407 _w(DLC) 2012038779 |
856 | 4 | 0 |
_uhttp://dx.doi.org/10.1002/9781118572115 _zWiley Online Library |
994 |
_a92 _bDG1 |
||
999 |
_c19877 _d19836 |
||
526 | _bcse |