CYBER FORENSICS (Record no. 5754)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04585cam a2200613M 4500 |
001 - CONTROL NUMBER | |
control field | 9781003057888 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240213122831.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210729s2021 xx o 0|| 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000424881 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 100042488X |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000424935 |
Qualifying information | (ePub ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000424936 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003057888 |
Qualifying information | (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003057888 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 036752418X |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367524180 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367524241 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 0367524244 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1201/9781003057888 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1262124342 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1262124342 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV8073 |
Item number | .M37 2021 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | LAW |
Subject category code subdivision | 041000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | JKVF1 |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.250285 |
Edition number | 23 |
245 00 - TITLE STATEMENT | |
Title | CYBER FORENSICS |
Medium | [electronic resource] : |
Remainder of title | examining emerging and hybrid technologies. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | [S.l.] : |
Name of publisher, distributor, etc. | CRC PRESS, |
Date of publication, distribution, etc. | 2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
336 ## - CONTENT TYPE | |
Content type term | still image |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | <P>Chapter 1 -- Cyber Forensics: Compliance and Auditing</p><p>Chapter 2 -- IoT and the Role of Cyber Forensics</p><p>Chapter 3 -- Cyber Forensics Examination of Unmanned Aerial Systems (UAS) and Unmanned Aerial Vehicles (UAV)</p><p>Chapter 4 -- Cloud Computing Forensics</p><p>Chapter 5 -- Forensics of the Digital Social Triangle with an Emphasis on Deep Fakes.</p><p>Chapter 6 -- Operational Technology, Security and Cyber Forensics</p><p>Chapter 7 -- Cyber Forensics and Risk Management.</p><p>Chapter 8 -- Mobile Device Forensics: An Introduction</p><p>Chapter 9 -- Forensic Accounting and the Use of E-Discovery and Cyber Forensics </p><p>Chapter 10 -- Cyber Forensic Tools and Utilities</p> |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Forensic sciences |
General subdivision | Technological innovations. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electronic evidence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Evidence, Criminal. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Criminal investigation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer crimes |
General subdivision | Investigation. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / General |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | LAW / Forensic Science |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Networking / Security |
Source of heading or term | bisacsh |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Marcella, Albert J. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Greenfield, Robert S., |
Dates associated with a name | 1961- |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Taylor & Francis |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781003057888">https://www.taylorfrancis.com/books/9781003057888</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
No items available.