skip to content
Computer forensics : incident response essentials Preview this item
ClosePreview this item
Checking...

Computer forensics : incident response essentials

Author: Warren G Kruse; Jay G Heiser
Publisher: Boston, MA : Addison-Wesley, 2001.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
"Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Kruse, Warren G.
Computer forensics.
Boston, MA : Addison-Wesley, 2001
(DLC) 2001034106
(OCoLC)47098296
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Warren G Kruse; Jay G Heiser
ISBN: 9780672333989 0672333988
OCLC Number: 608327068
Reproduction Notes: Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL
Description: 1 online resource (xiii, 392) : illustrations
Details: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Contents: Introduction to computer forensics --
Tracking an offender --
The basics of hard drives and storage media --
Encryption and forensics --
Data hiding --
Hostile code --
Your electronic toolkit --
Investigating Windows computers --
Introduction to Unix for forensic examiners --
Compromising a Unix host --
Investigating a Unix host --
Introduction to the criminal justice system.
Responsibility: Warren G. Kruse II, Jay G. Heiser.

Abstract:

Written by two experts in digital investigation, this work provides information on how to handle the computer as evidence. It walks the student through the complete forensics process from the initial  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/608327068> # Computer forensics : incident response essentials
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "608327068" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/10665523#Place/boston_ma> ; # Boston, MA
   schema:about <http://experiment.worldcat.org/entity/work/data/10665523#Topic/computercriminaliteit> ; # Computercriminaliteit
   schema:about <http://experiment.worldcat.org/entity/work/data/10665523#Topic/gerechtelijke_technologie> ; # Gerechtelijke technologie
   schema:about <http://dewey.info/class/005.8/e21/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/10665523#Topic/computer_networks_security_measures> ; # Computer networks / Security measures
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/932011> ; # Forensic sciences
   schema:about <http://experiment.worldcat.org/entity/work/data/10665523#Topic/computerbeveiliging> ; # Computerbeveiliging
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://dewey.info/class/363.25968/e21/> ;
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/65810282> ; # Jay G. Heiser
   schema:creator <http://viaf.org/viaf/68268649> ; # Warren G. Kruse
   schema:datePublished "2001" ;
   schema:description "Introduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/10665523> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/47098296> ;
   schema:name "Computer forensics : incident response essentials"@en ;
   schema:productID "608327068" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/608327068#PublicationEvent/boston_ma_addison_wesley_2001> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/10665523#Agent/addison_wesley> ; # Addison-Wesley
   schema:reviews <http://www.worldcat.org/title/-/oclc/608327068#Review/-711908697> ;
   schema:url <http://proquest.tech.safaribooksonline.de/9780672333989> ;
   schema:url <http://proquest.safaribooksonline.com/9780672333989> ;
   schema:url <http://proquest.safaribooksonline.com/?fpi=9780672333989> ;
   schema:url <http://www.myilibrary.com?id=285291> ;
   schema:url <http://catalog.hathitrust.org/api/volumes/oclc/47098296.html> ;
   schema:url <http://books.google.com/books?id=nNpQAAAAMAAJ> ;
   schema:workExample <http://worldcat.org/isbn/9780672333989> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/608327068> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/10665523#Agent/addison_wesley> # Addison-Wesley
    a bgn:Agent ;
   schema:name "Addison-Wesley" ;
    .

<http://experiment.worldcat.org/entity/work/data/10665523#Topic/computer_networks_security_measures> # Computer networks / Security measures
    a schema:Intangible ;
   schema:name "Computer networks / Security measures"@en ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/10665523#Topic/computerbeveiliging> # Computerbeveiliging
    a schema:Intangible ;
   schema:name "Computerbeveiliging"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/10665523#Topic/computercriminaliteit> # Computercriminaliteit
    a schema:Intangible ;
   schema:name "Computercriminaliteit"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/10665523#Topic/gerechtelijke_technologie> # Gerechtelijke technologie
    a schema:Intangible ;
   schema:name "Gerechtelijke technologie"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/932011> # Forensic sciences
    a schema:Intangible ;
   schema:name "Forensic sciences"@en ;
    .

<http://viaf.org/viaf/65810282> # Jay G. Heiser
    a schema:Person ;
   schema:familyName "Heiser" ;
   schema:givenName "Jay G." ;
   schema:name "Jay G. Heiser" ;
    .

<http://viaf.org/viaf/68268649> # Warren G. Kruse
    a schema:Person ;
   schema:familyName "Kruse" ;
   schema:givenName "Warren G." ;
   schema:name "Warren G. Kruse" ;
    .

<http://worldcat.org/isbn/9780672333989>
    a schema:ProductModel ;
   schema:isbn "0672333988" ;
   schema:isbn "9780672333989" ;
    .

<http://www.worldcat.org/oclc/47098296>
    a schema:CreativeWork ;
   rdfs:label "Computer forensics." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/608327068> ; # Computer forensics : incident response essentials
    .

<http://www.worldcat.org/title/-/oclc/608327068#Review/-711908697>
    a schema:Review ;
   schema:itemReviewed <http://www.worldcat.org/oclc/608327068> ; # Computer forensics : incident response essentials
   schema:reviewBody ""Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process - from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered." "Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.