Cyber crime investigator's field guide
"Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be further enhanced. Numerous laws implemented over the past 30 years have provided law enforcement with more teeth to take a bite out of cybercrime, but...
Main Author: | |
---|---|
Format: | Electronic/Print Book |
Language: | English |
Published: |
Boca Raton London New York
CRC Press
2022
|
In: | Year: 2022 |
Edition: | Third edition |
Online Access: |
Table of Contents Blurb Volltext (doi) |
Availability in Tübingen: | Present in Tübingen. UB: KB 21 A 2626 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: | |
Related Items: | Erscheint auch als:
1801258449 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1788061888 | ||
003 | DE-627 | ||
005 | 20221223160420.0 | ||
007 | tu | ||
008 | 220201s2022 xxu||||| 00| ||eng c | ||
010 | |a 2022001601 | ||
020 | |a 9780367682309 |c hbk |9 978-0-367-68230-9 | ||
020 | |a 9781032301891 |c pbk |9 978-1-032-30189-1 | ||
024 | 7 | |a 10.1201/9781003134817 |2 doi | |
035 | |a (DE-627)1788061888 | ||
035 | |a (DE-599)KXP1788061888 | ||
035 | |a (OCoLC)1350726223 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XD-US | ||
050 | 0 | |a HV8079.C65 | |
082 | 0 | |a 363.25/968 |q LOC | |
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Middleton, Bruce |d 1953- |e VerfasserIn |0 (DE-588)1274849756 |0 (DE-627)1826429328 |4 aut | |
109 | |a Middleton, Bruce 1953- |a Middleton, Bruce T. 1953- | ||
245 | 1 | 0 | |a Cyber crime investigator's field guide |c Bruce Middleton |
250 | |a Third edition | ||
263 | |a 2208 | ||
264 | 1 | |a Boca Raton |a London |a New York |b CRC Press |c 2022 | |
300 | |a xiii, 338 Seiten |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a "Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be further enhanced. Numerous laws implemented over the past 30 years have provided law enforcement with more teeth to take a bite out of cybercrime, but there continues to be a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Third Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cybercrime. This volume is also well constructed for use in a college classroom environment, with questions at the end of each chapter (a separate answer guide is available for instructors). This volume also offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, IOC's (Indicator's of Compromise), UNIX / Linux commands, PowerShell commands, Windows commands, Cisco commands, and more. Also included in this 3rd edition is a section on rail transportation security, a synopsis of laws focused on cybercrime, Python 3.X programs, PowerShell programs, WireShark PCAP file analysis, use of Kali Linux tools, and more. Features: Analyses of the usage of the latest evidence collection and analysis tools Covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence"-- | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f FID |2 pdager |5 DE-21 | |
650 | 0 | |a Computer crimes |x Investigation |v Handbooks, manuals, etc | |
689 | 0 | 0 | |d s |0 (DE-588)4010452-7 |0 (DE-627)106357816 |0 (DE-576)208888128 |a Computerkriminalität |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4232202-9 |0 (DE-627)104926821 |0 (DE-576)210361867 |a Computersabotage |2 gnd |
689 | 0 | |5 (DE-627) | |
776 | 1 | |z 9781003134817 |c (ebk) | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |a Middleton, Bruce |t Cyber Crime Investigator's Field Guide |b 3rd ed. |d Milton : Auerbach Publishers, Incorporated, 2022 |h 1 online resource (353 pages) |w (DE-627)1801258449 |z 9781000610499 |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1788061888inh.htm |m V:DE-576 |m B:DE-21 |v 20221210193046 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1788061888kla.htm |m V:DE-576 |m B:DE-21 |v 20221210193046 |3 Klappentext |
856 | |u https://doi.org/10.1201/9781003134817 |x doi |3 Volltext | ||
951 | |a BO | ||
ELC | |a 1 |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 421012592X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1788061888 | ||
LOK | |0 005 20221207112249 | ||
LOK | |0 008 221114||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 21 A 2626 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 2212 |f 34 | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 21 A 2626 |