NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Cyber Crime Investigator's Field Guide (Record no. 4856)

MARC details
000 -LEADER
fixed length control field 03233cam a2200445Mu 4500
001 - CONTROL NUMBER
control field 9781003134817
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122825.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220507s2022 xx o ||| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000610499
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000610497
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003134817
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003134815
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000610475
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000610470
Qualifying information (electronic bk. : PDF)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9781003134817
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1314628757
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1314628757
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code JKVF1
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25/968
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Middleton, Bruce.
245 10 - TITLE STATEMENT
Title Cyber Crime Investigator's Field Guide
Medium [electronic resource].
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Milton :
Name of publisher, distributor, etc. Auerbach Publishers, Incorporated,
Date of publication, distribution, etc. 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (353 p.)
500 ## - GENERAL NOTE
General note Description based upon print version of record.
520 ## - SUMMARY, ETC.
Summary, etc. Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)--all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition. Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws, rules, and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why, and how in the investigation of cybercrime. Features New focus area on rail transportation, OSINT, medical devices, and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive "the call," arrival on site, chain of custody, and more This book offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, Linux commands, Cisco firewall commands, port numbers, and more.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Networking / Security
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Cryptography
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Internet / Security
Source of heading or term bisacsh
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003134817">https://www.taylorfrancis.com/books/9781003134817</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.