Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence

Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected About This Audiobook Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully Record the digital evidence co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Oettinger, William (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Place of publication not identified] Packt Publishing 2022
Ausgabe:[First edition].
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-083658440
003 DE-627-1
005 20240228121855.0
007 cr uuu---uuuuu
008 230111s2022 xx |||||o 00| ||eng c
020 |a 9781837632503  |c electronic audio bk.  |9 978-1-83763-250-3 
020 |a 1837632502  |c electronic audio bk.  |9 1-83763-250-2 
035 |a (DE-627-1)083658440 
035 |a (DE-599)KEP083658440 
035 |a (ORHE)9781837632503 
035 |a (DE-627-1)083658440 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 363.25968  |2 23/eng/20221213 
100 1 |a Oettinger, William  |e VerfasserIn  |4 aut 
245 1 0 |a Learn computer forensics  |b a beginner's guide to searching, analyzing, and securing digital evidence  |c William Oettinger 
250 |a [First edition]. 
264 1 |a [Place of publication not identified]  |b Packt Publishing  |c 2022 
300 |a 1 online resource (1 audio file (9 hr., 17 min.)) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; title from title details screen (O'Reilly, viewed December 13, 2022) 
520 |a Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected About This Audiobook Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully Record the digital evidence collected and organize a forensic examination on it Perform an assortment of Windows scientific examinations to analyze and overcome complex challenges In Detail Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator. Audience This book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful. 
650 0 |a Computer crimes  |x Investigation 
650 0 |a Criminal investigation 
650 0 |a Computer security 
650 0 |a Electronic evidence 
650 0 |a Hackers 
650 4 |a Criminalité informatique ; Enquêtes 
650 4 |a Enquêtes criminelles 
650 4 |a Sécurité informatique 
650 4 |a Preuve électronique 
650 4 |a Pirates informatiques 
650 4 |a Computer crimes ; Investigation 
650 4 |a Computer security 
650 4 |a Criminal investigation 
650 4 |a Electronic evidence 
650 4 |a Hackers 
650 4 |a Audiobooks 
650 4 |a Audiobooks 
650 4 |a Livres audio 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781837632503/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-083658440
_version_ 1818767248472408064
adam_text
any_adam_object
author Oettinger, William
author_facet Oettinger, William
author_role aut
author_sort Oettinger, William
author_variant w o wo
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)083658440
(DE-599)KEP083658440
(ORHE)9781837632503
dewey-full 363.25968
dewey-hundreds 300 - Social sciences
dewey-ones 363 - Other social problems and services
dewey-raw 363.25968
dewey-search 363.25968
dewey-sort 3363.25968
dewey-tens 360 - Social problems and services; associations
discipline Soziologie
edition [First edition].
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03982cam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-083658440</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121855.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230111s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781837632503</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-83763-250-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1837632502</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-83763-250-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)083658440</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP083658440</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781837632503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)083658440</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25968</subfield><subfield code="2">23/eng/20221213</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oettinger, William</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learn computer forensics</subfield><subfield code="b">a beginner's guide to searching, analyzing, and securing digital evidence</subfield><subfield code="c">William Oettinger</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 audio file (9 hr., 17 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed December 13, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected About This Audiobook Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully Record the digital evidence collected and organize a forensic examination on it Perform an assortment of Windows scientific examinations to analyze and overcome complex challenges In Detail Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator. Audience This book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic evidence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Enquêtes criminelles</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Preuve électronique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminal investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic evidence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781837632503/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-083658440
illustrated Not Illustrated
indexdate 2024-12-18T08:46:52Z
institution BVB
isbn 9781837632503
1837632502
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 audio file (9 hr., 17 min.))
psigel ZDB-30-ORH
publishDate 2022
publishDateSearch 2022
publishDateSort 2022
publisher Packt Publishing
record_format marc
spelling Oettinger, William VerfasserIn aut
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence William Oettinger
[First edition].
[Place of publication not identified] Packt Publishing 2022
1 online resource (1 audio file (9 hr., 17 min.))
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; title from title details screen (O'Reilly, viewed December 13, 2022)
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected About This Audiobook Investigate the core methods of computer forensics to procure and secure advanced digital evidence skillfully Record the digital evidence collected and organize a forensic examination on it Perform an assortment of Windows scientific examinations to analyze and overcome complex challenges In Detail Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator. Audience This book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.
Computer crimes Investigation
Criminal investigation
Computer security
Electronic evidence
Hackers
Criminalité informatique ; Enquêtes
Enquêtes criminelles
Sécurité informatique
Preuve électronique
Pirates informatiques
Computer crimes ; Investigation
Audiobooks
Livres audio
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781837632503/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Oettinger, William
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
Computer crimes Investigation
Criminal investigation
Computer security
Electronic evidence
Hackers
Criminalité informatique ; Enquêtes
Enquêtes criminelles
Sécurité informatique
Preuve électronique
Pirates informatiques
Computer crimes ; Investigation
Audiobooks
Livres audio
title Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
title_auth Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
title_exact_search Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
title_full Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence William Oettinger
title_fullStr Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence William Oettinger
title_full_unstemmed Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence William Oettinger
title_short Learn computer forensics
title_sort learn computer forensics a beginner s guide to searching analyzing and securing digital evidence
title_sub a beginner's guide to searching, analyzing, and securing digital evidence
topic Computer crimes Investigation
Criminal investigation
Computer security
Electronic evidence
Hackers
Criminalité informatique ; Enquêtes
Enquêtes criminelles
Sécurité informatique
Preuve électronique
Pirates informatiques
Computer crimes ; Investigation
Audiobooks
Livres audio
topic_facet Computer crimes Investigation
Criminal investigation
Computer security
Electronic evidence
Hackers
Criminalité informatique ; Enquêtes
Enquêtes criminelles
Sécurité informatique
Preuve électronique
Pirates informatiques
Computer crimes ; Investigation
Audiobooks
Livres audio
url https://learning.oreilly.com/library/view/-/9781837632503/?ar
work_keys_str_mv AT oettingerwilliam learncomputerforensicsabeginnersguidetosearchinganalyzingandsecuringdigitalevidence