MARC details
000 -LIDER |
fixed length control field |
05170nam a22005655i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-319-96319-8 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210201191309.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180731s2018 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319963198 |
-- |
978-3-319-96319-8 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM053000 |
Source |
bisacsh |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UTN |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kävrestad, Joakim. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT |
Title |
Fundamentals of Digital Forensics |
Medium |
[electronic resource] : |
Remainder of title |
Theory, Methods, and Real-Life Applications / |
Statement of responsibility, etc. |
by Joakim Kävrestad. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2018. |
264 #1 - |
-- |
Cham : |
-- |
Springer International Publishing : |
-- |
Imprint: Springer, |
-- |
2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XII, 230 p. 124 illus., 6 illus. in color. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
500 ## - GENERAL NOTE |
General note |
Acceso multiusuario |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part I: Theory -- What is Digital Forensics? -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Collecting Evidence -- Analyzing Data and Writing Reports -- Part II: Put It to Practice -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Open Source or Freeware Tools -- Part III: Memory Forensics -- Memory Management -- Volatility -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Part IV: Appendices -- Appendix A - Solutions -- Appendix B - Useful Scripts -- Appendix C - Sample Report (Template) -- Appendix D - List of Time Zones -- Appendix E - complete Jitsi Chat Log. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can't. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries. Topics and features: Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes Offers a practical overview of common practices for cracking encrypted data Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them Presents a survey of various different search techniques, and several forensic tools that are available for free Examines the functions of AccessData Forensic Toolkit and Registry Viewer Proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled Describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility Provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector. Joakim Kävrestad is a Lecturer in informatics at the University of Skövde, Sweden, with several years of experience as a forensic expert with the Swedish police. |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Owner |
UABC ; |
Method of acquisition |
Temporal ; |
Date of acquisition |
01/01/2021-12/31/2023. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Optical data processing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Public safety. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Systems and Data Security. |
-- |
https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Image Processing and Computer Vision. |
-- |
https://scigraph.springernature.com/ontologies/product-market-codes/I22021 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Cryptology. |
-- |
https://scigraph.springernature.com/ontologies/product-market-codes/I28020 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Crime Control and Security. |
-- |
https://scigraph.springernature.com/ontologies/product-market-codes/1BE000 |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783319963181 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783319963204 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Public note |
Libro electrónico |
Uniform Resource Identifier |
http://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-96319-8 |
912 ## - |
-- |
ZDB-2-SCS |
912 ## - |
-- |
ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Libro Electrónico |