NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

CYBER FORENSICS (Record no. 5754)

MARC details
000 -LEADER
fixed length control field 04585cam a2200613M 4500
001 - CONTROL NUMBER
control field 9781003057888
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122831.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210729s2021 xx o 0|| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000424881
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 100042488X
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000424935
Qualifying information (ePub ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000424936
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003057888
Qualifying information (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003057888
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 036752418X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367524180
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367524241
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0367524244
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9781003057888
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1262124342
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1262124342
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8073
Item number .M37 2021
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code LAW
Subject category code subdivision 041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code JKVF1
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.250285
Edition number 23
245 00 - TITLE STATEMENT
Title CYBER FORENSICS
Medium [electronic resource] :
Remainder of title examining emerging and hybrid technologies.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. [S.l.] :
Name of publisher, distributor, etc. CRC PRESS,
Date of publication, distribution, etc. 2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
336 ## - CONTENT TYPE
Content type term still image
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note <P>Chapter 1 -- Cyber Forensics: Compliance and Auditing</p><p>Chapter 2 -- IoT and the Role of Cyber Forensics</p><p>Chapter 3 -- Cyber Forensics Examination of Unmanned Aerial Systems (UAS) and Unmanned Aerial Vehicles (UAV)</p><p>Chapter 4 -- Cloud Computing Forensics</p><p>Chapter 5 -- Forensics of the Digital Social Triangle with an Emphasis on Deep Fakes.</p><p>Chapter 6 -- Operational Technology, Security and Cyber Forensics</p><p>Chapter 7 -- Cyber Forensics and Risk Management.</p><p>Chapter 8 -- Mobile Device Forensics: An Introduction</p><p>Chapter 9 -- Forensic Accounting and the Use of E-Discovery and Cyber Forensics </p><p>Chapter 10 -- Cyber Forensic Tools and Utilities</p>
520 ## - SUMMARY, ETC.
Summary, etc. Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Forensic sciences
General subdivision Technological innovations.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic evidence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Evidence, Criminal.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Criminal investigation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element LAW / Forensic Science
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Networking / Security
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Marcella, Albert J.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Greenfield, Robert S.,
Dates associated with a name 1961-
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003057888">https://www.taylorfrancis.com/books/9781003057888</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.