Cyber crime investigator's field guide

"Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be further enhanced. Numerous laws implemented over the past 30 years have provided law enforcement with more teeth to take a bite out of cybercrime, but...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Middleton, Bruce (VerfasserIn)
Medienart: Elektronisch/Druck Buch
Sprache:Englisch
Veröffentlicht: Boca Raton London New York CRC Press 2022
In:Jahr: 2022
Ausgabe:Third edition
Online Zugang: Inhaltsverzeichnis
Klappentext
Volltext (doi)
Bestand in Tübingen:In Tübingen vorhanden.
UB: KB 21 A 2626
Verfügbarkeit prüfen: HBZ Gateway
Subito Bestelldienst: Jetzt bestellen.
Schlagwörter:
Ähnliche Datensätze:Erscheint auch als: 1801258449

MARC

LEADER 00000cam a2200000 4500
001 1788061888
003 DE-627
005 20221223160420.0
007 tu
008 220201s2022 xxu||||| 00| ||eng c
010 |a  2022001601 
020 |a 9780367682309  |c hbk  |9 978-0-367-68230-9 
020 |a 9781032301891  |c pbk  |9 978-1-032-30189-1 
024 7 |a 10.1201/9781003134817  |2 doi 
035 |a (DE-627)1788061888 
035 |a (DE-599)KXP1788061888 
035 |a (OCoLC)1350726223 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
044 |c XD-US 
050 0 |a HV8079.C65 
082 0 |a 363.25/968  |q LOC 
084 |a 2,1  |2 ssgn 
100 1 |a Middleton, Bruce  |d 1953-  |e VerfasserIn  |0 (DE-588)1274849756  |0 (DE-627)1826429328  |4 aut 
109 |a Middleton, Bruce 1953-  |a Middleton, Bruce T. 1953- 
245 1 0 |a Cyber crime investigator's field guide  |c Bruce Middleton 
250 |a Third edition 
263 |a 2208 
264 1 |a Boca Raton  |a London  |a New York  |b CRC Press  |c 2022 
300 |a xiii, 338 Seiten  |b Illustrationen 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a "Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be further enhanced. Numerous laws implemented over the past 30 years have provided law enforcement with more teeth to take a bite out of cybercrime, but there continues to be a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Third Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cybercrime. This volume is also well constructed for use in a college classroom environment, with questions at the end of each chapter (a separate answer guide is available for instructors). This volume also offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, IOC's (Indicator's of Compromise), UNIX / Linux commands, PowerShell commands, Windows commands, Cisco commands, and more. Also included in this 3rd edition is a section on rail transportation security, a synopsis of laws focused on cybercrime, Python 3.X programs, PowerShell programs, WireShark PCAP file analysis, use of Kali Linux tools, and more. Features: Analyses of the usage of the latest evidence collection and analysis tools Covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence"-- 
583 1 |a Archivierung/Langzeitarchivierung gewährleistet  |f FID  |2 pdager  |5 DE-21 
650 0 |a Computer crimes  |x Investigation  |v Handbooks, manuals, etc 
689 0 0 |d s  |0 (DE-588)4010452-7  |0 (DE-627)106357816  |0 (DE-576)208888128  |a Computerkriminalität  |2 gnd 
689 0 1 |d s  |0 (DE-588)4232202-9  |0 (DE-627)104926821  |0 (DE-576)210361867  |a Computersabotage  |2 gnd 
689 0 |5 (DE-627) 
776 1 |z 9781003134817  |c (ebk) 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |a Middleton, Bruce  |t Cyber Crime Investigator's Field Guide  |b 3rd ed.  |d Milton : Auerbach Publishers, Incorporated, 2022  |h 1 online resource (353 pages)  |w (DE-627)1801258449  |z 9781000610499 
856 4 2 |u https://swbplus.bsz-bw.de/bsz1788061888inh.htm  |m V:DE-576  |m B:DE-21  |v 20221210193046  |3 Inhaltsverzeichnis 
856 4 2 |u https://swbplus.bsz-bw.de/bsz1788061888kla.htm  |m V:DE-576  |m B:DE-21  |v 20221210193046  |3 Klappentext 
856 |u https://doi.org/10.1201/9781003134817  |x doi  |3 Volltext 
951 |a BO 
ELC |a 1  |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 421012592X 
LOK |0 003 DE-627 
LOK |0 004 1788061888 
LOK |0 005 20221207112249 
LOK |0 008 221114||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 852   |a DE-21 
LOK |0 852 1  |c KB 21 A 2626  |9 00 
LOK |0 935   |a krim 
LOK |0 938   |a 2212  |f 34 
ORI |a SA-MARC-krimdoka001.raw 
SIG |a UB: KB 21 A 2626