Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected About This Audiobook Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully Record the digital evidence co...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2022
|
Ausgabe: | [First edition]. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-083658440 | ||
003 | DE-627-1 | ||
005 | 20240228121855.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230111s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781837632503 |c electronic audio bk. |9 978-1-83763-250-3 | ||
020 | |a 1837632502 |c electronic audio bk. |9 1-83763-250-2 | ||
035 | |a (DE-627-1)083658440 | ||
035 | |a (DE-599)KEP083658440 | ||
035 | |a (ORHE)9781837632503 | ||
035 | |a (DE-627-1)083658440 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 363.25968 |2 23/eng/20221213 | |
100 | 1 | |a Oettinger, William |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Learn computer forensics |b a beginner's guide to searching, analyzing, and securing digital evidence |c William Oettinger |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2022 | |
300 | |a 1 online resource (1 audio file (9 hr., 17 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed December 13, 2022) | ||
520 | |a Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected About This Audiobook Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully Record the digital evidence collected and organize a forensic examination on it Perform an assortment of Windows scientific examinations to analyze and overcome complex challenges In Detail Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator. Audience This book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful. | ||
650 | 0 | |a Computer crimes |x Investigation | |
650 | 0 | |a Criminal investigation | |
650 | 0 | |a Computer security | |
650 | 0 | |a Electronic evidence | |
650 | 0 | |a Hackers | |
650 | 4 | |a Criminalité informatique ; Enquêtes | |
650 | 4 | |a Enquêtes criminelles | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Preuve électronique | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Computer crimes ; Investigation | |
650 | 4 | |a Computer security | |
650 | 4 | |a Criminal investigation | |
650 | 4 | |a Electronic evidence | |
650 | 4 | |a Hackers | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781837632503/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-083658440 |
---|---|
_version_ | 1818767248472408064 |
adam_text | |
any_adam_object | |
author | Oettinger, William |
author_facet | Oettinger, William |
author_role | aut |
author_sort | Oettinger, William |
author_variant | w o wo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)083658440 (DE-599)KEP083658440 (ORHE)9781837632503 |
dewey-full | 363.25968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25968 |
dewey-search | 363.25968 |
dewey-sort | 3363.25968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03982cam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-083658440</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121855.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230111s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781837632503</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-83763-250-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1837632502</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-83763-250-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)083658440</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP083658440</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781837632503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)083658440</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25968</subfield><subfield code="2">23/eng/20221213</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oettinger, William</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learn computer forensics</subfield><subfield code="b">a beginner's guide to searching, analyzing, and securing digital evidence</subfield><subfield code="c">William Oettinger</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 audio file (9 hr., 17 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed December 13, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected About This Audiobook Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully Record the digital evidence collected and organize a forensic examination on it Perform an assortment of Windows scientific examinations to analyze and overcome complex challenges In Detail Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator. Audience This book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic evidence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Enquêtes criminelles</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Preuve électronique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminal investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic evidence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781837632503/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-083658440 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:46:52Z |
institution | BVB |
isbn | 9781837632503 1837632502 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 audio file (9 hr., 17 min.)) |
psigel | ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing |
record_format | marc |
spelling | Oettinger, William VerfasserIn aut Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence William Oettinger [First edition]. [Place of publication not identified] Packt Publishing 2022 1 online resource (1 audio file (9 hr., 17 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed December 13, 2022) Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected About This Audiobook Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully Record the digital evidence collected and organize a forensic examination on it Perform an assortment of Windows scientific examinations to analyze and overcome complex challenges In Detail Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator. Audience This book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful. Computer crimes Investigation Criminal investigation Computer security Electronic evidence Hackers Criminalité informatique ; Enquêtes Enquêtes criminelles Sécurité informatique Preuve électronique Pirates informatiques Computer crimes ; Investigation Audiobooks Livres audio TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781837632503/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Oettinger, William Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence Computer crimes Investigation Criminal investigation Computer security Electronic evidence Hackers Criminalité informatique ; Enquêtes Enquêtes criminelles Sécurité informatique Preuve électronique Pirates informatiques Computer crimes ; Investigation Audiobooks Livres audio |
title | Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence |
title_auth | Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence |
title_exact_search | Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence |
title_full | Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence William Oettinger |
title_fullStr | Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence William Oettinger |
title_full_unstemmed | Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence William Oettinger |
title_short | Learn computer forensics |
title_sort | learn computer forensics a beginner s guide to searching analyzing and securing digital evidence |
title_sub | a beginner's guide to searching, analyzing, and securing digital evidence |
topic | Computer crimes Investigation Criminal investigation Computer security Electronic evidence Hackers Criminalité informatique ; Enquêtes Enquêtes criminelles Sécurité informatique Preuve électronique Pirates informatiques Computer crimes ; Investigation Audiobooks Livres audio |
topic_facet | Computer crimes Investigation Criminal investigation Computer security Electronic evidence Hackers Criminalité informatique ; Enquêtes Enquêtes criminelles Sécurité informatique Preuve électronique Pirates informatiques Computer crimes ; Investigation Audiobooks Livres audio |
url | https://learning.oreilly.com/library/view/-/9781837632503/?ar |
work_keys_str_mv | AT oettingerwilliam learncomputerforensicsabeginnersguidetosearchinganalyzingandsecuringdigitalevidence |