skip to content
Cyber crime investigator's field guide Preview this item
ClosePreview this item
Checking...

Cyber crime investigator's field guide

Author: Bruce Middleton
Publisher: Boca Raton : Auerbach Publications, ©2005.
Edition/Format:   eBook : Document : English : 2nd edView all editions and formats
Database:WorldCat
Summary:
The movement toward miniaturized and mobile computing has created more opportunity for cyber thieves. To respond effectively, IT security professionals need a resource that combines the understanding of investigative techniques with the technical knowledge of cyberspace. Cyber Crime Investigator's Field Guide, Second Edition provides an investigative framework, demonstrates the knowledge of how cyberspace really  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Handbooks and manuals
Handbooks, manuals, etc
Guides, manuels, etc
Additional Physical Format: Print version:
Middleton, Bruce.
Cyber crime investigator's field guide.
Boca Raton : Auerbach Publications, ©2005
(DLC) 2004046396
(OCoLC)56194699
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Bruce Middleton
ISBN: 0203005236 9780203005231 9781420031324 1420031325 0849327687 9780849327681
OCLC Number: 61363643
Notes: Includes index.
Description: 1 online resource (xiv, 279 pages) : illustrations
Contents: Book Cover; Title; Copyright; Contents; About The Author; Preface; Chapter 1 The Initial Contact; Chapter 2 Client Site Arrival; Chapter 3 Evidence Collection Procedures; Chapter 4 Evidence Collection And Analysis Tools; Chapter 5 Accessdata's Forensic Tool Kit; Chapter 6 Guidance Software's Encase; Chapter 7 Ilook Investigator; Chapter 8 Password Recovery; Chapter 9 Questions And Answers By Subject Area; Chapter 10 Recommended Reference Materials; Chapter 11 Case Study; Appendix A Glossary; Appendix B Port Numbers Used By Malicious Trojan Horse Programs; Appendix C Attack Signatures.
Other Titles: Cybercrime investigator's field guide
Responsibility: Bruce Middleton.
More information:

Abstract:

Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. This title provides the investigative framework that needs to be followed, along  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/61363643> # Cyber crime investigator's field guide
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
   library:oclcnum "61363643" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/324165#Place/boca_raton> ; # Boca Raton
   rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://www.contentreserve.com/TitleInfo.asp?ID={AF2FF14F-CB5F-4ACE-9CB4-325344E0E7DE}&Format=50'" ;
   schema:about <http://id.loc.gov/authorities/subjects/sh85029493> ; # Computer crimes--Investigation
   schema:about <http://experiment.worldcat.org/entity/work/data/324165#Topic/law_forensic_science> ; # LAW--Forensic Science
   schema:about <http://experiment.worldcat.org/entity/work/data/324165#Topic/criminalite_informatique_enquetes> ; # Criminalité informatique--Enquêtes
   schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
   schema:about <http://dewey.info/class/363.25968/e22/> ;
   schema:alternateName "Cybercrime investigator's field guide" ;
   schema:bookEdition "2nd ed." ;
   schema:bookFormat schema:EBook ;
   schema:copyrightYear "2005" ;
   schema:creator <http://viaf.org/viaf/280104512> ; # Bruce Middleton
   schema:datePublished "2005" ;
   schema:description "Book Cover; Title; Copyright; Contents; About The Author; Preface; Chapter 1 The Initial Contact; Chapter 2 Client Site Arrival; Chapter 3 Evidence Collection Procedures; Chapter 4 Evidence Collection And Analysis Tools; Chapter 5 Accessdata's Forensic Tool Kit; Chapter 6 Guidance Software's Encase; Chapter 7 Ilook Investigator; Chapter 8 Password Recovery; Chapter 9 Questions And Answers By Subject Area; Chapter 10 Recommended Reference Materials; Chapter 11 Case Study; Appendix A Glossary; Appendix B Port Numbers Used By Malicious Trojan Horse Programs; Appendix C Attack Signatures."@en ;
   schema:description "The movement toward miniaturized and mobile computing has created more opportunity for cyber thieves. To respond effectively, IT security professionals need a resource that combines the understanding of investigative techniques with the technical knowledge of cyberspace. Cyber Crime Investigator's Field Guide, Second Edition provides an investigative framework, demonstrates the knowledge of how cyberspace really works, and explains the tools needed to pursue cyber criminals. This volume provides the details of investigating computer crime from soup to nuts. It covers the entire investigative p."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/324165> ;
   schema:genre "Handbooks and manuals"@en ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/56194699> ;
   schema:name "Cyber crime investigator's field guide"@en ;
   schema:productID "61363643" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/61363643#PublicationEvent/boca_raton_auerbach_publications_2005> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/324165#Agent/auerbach_publications> ; # Auerbach Publications
   schema:url <http://site.ebrary.com/id/10175451> ;
   schema:url <http://www.infosecuritynetbase.com/ejournals/books/book_km.asp?id=1679> ;
   schema:url <http://www.myilibrary.com?id=151563> ;
   schema:url <http://swb.eblib.com/patron/FullRecord.aspx?p=201250> ;
   schema:url <http://www.infosecuritynetbase.com/ejournals/books/book_summary/summary.asp?id=1679> ;
   schema:url "http://www.contentreserve.com/TitleInfo.asp?ID={AF2FF14F-CB5F-4ACE-9CB4-325344E0E7DE}&Format=50" ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=115449> ;
   schema:url <http://www.forensicnetbase.com/ejournals/books/book_km.asp?id=1679> ;
   schema:url <http://www.myilibrary.com?id=16440> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=201250> ;
   schema:url <http://www.crcnetbase.com/isbn/9780849327681> ;
   schema:url <http://marc.crcnetbase.com/isbn/9781420031324> ;
   schema:url <http://www.crcnetbase.com/isbn/9781420031324> ;
   schema:workExample <http://worldcat.org/isbn/9780849327681> ;
   schema:workExample <http://worldcat.org/isbn/9781420031324> ;
   schema:workExample <http://worldcat.org/isbn/9780203005231> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/61363643> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/324165#Agent/auerbach_publications> # Auerbach Publications
    a bgn:Agent ;
   schema:name "Auerbach Publications" ;
    .

<http://experiment.worldcat.org/entity/work/data/324165#Topic/criminalite_informatique_enquetes> # Criminalité informatique--Enquêtes
    a schema:Intangible ;
   schema:name "Criminalité informatique--Enquêtes"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/324165#Topic/law_forensic_science> # LAW--Forensic Science
    a schema:Intangible ;
   schema:name "LAW--Forensic Science"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029493> # Computer crimes--Investigation
    a schema:Intangible ;
   schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
   schema:name "Computer crimes--Investigation"@en ;
    .

<http://marc.crcnetbase.com/isbn/9781420031324>
   rdfs:comment "Distributed by publisher. Purchase or institutional license may be required for access." ;
    .

<http://viaf.org/viaf/280104512> # Bruce Middleton
    a schema:Person ;
   schema:familyName "Middleton" ;
   schema:givenName "Bruce" ;
   schema:name "Bruce Middleton" ;
    .

<http://worldcat.org/isbn/9780203005231>
    a schema:ProductModel ;
   schema:isbn "0203005236" ;
   schema:isbn "9780203005231" ;
    .

<http://worldcat.org/isbn/9780849327681>
    a schema:ProductModel ;
   schema:isbn "0849327687" ;
   schema:isbn "9780849327681" ;
    .

<http://worldcat.org/isbn/9781420031324>
    a schema:ProductModel ;
   schema:isbn "1420031325" ;
   schema:isbn "9781420031324" ;
    .

<http://www.worldcat.org/oclc/56194699>
    a schema:CreativeWork ;
   rdfs:label "Cyber crime investigator's field guide." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/61363643> ; # Cyber crime investigator's field guide
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.