Cyber Crime Investigator's Field Guide (Record no. 4856)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03233cam a2200445Mu 4500 |
001 - CONTROL NUMBER | |
control field | 9781003134817 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240213122825.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220507s2022 xx o ||| 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000610499 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000610497 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003134817 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003134815 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000610475 |
Qualifying information | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000610470 |
Qualifying information | (electronic bk. : PDF) |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1201/9781003134817 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1314628757 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1314628757 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 060040 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | JKVF1 |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.25/968 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Middleton, Bruce. |
245 10 - TITLE STATEMENT | |
Title | Cyber Crime Investigator's Field Guide |
Medium | [electronic resource]. |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Milton : |
Name of publisher, distributor, etc. | Auerbach Publishers, Incorporated, |
Date of publication, distribution, etc. | 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (353 p.) |
500 ## - GENERAL NOTE | |
General note | Description based upon print version of record. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)--all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition. Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws, rules, and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why, and how in the investigation of cybercrime. Features New focus area on rail transportation, OSINT, medical devices, and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive "the call," arrival on site, chain of custody, and more This book offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, Linux commands, Cisco firewall commands, port numbers, and more. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Networking / Security |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Cryptography |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Internet / Security |
Source of heading or term | bisacsh |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Taylor & Francis |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781003134817">https://www.taylorfrancis.com/books/9781003134817</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
No items available.