A practical guide to computer forensics investigations / (Record no. 4901)

MARC details
000 -LEADER
fixed length control field 09788cam a2200541Ii 4500
001 - CONTROL NUMBER
control field u158051
003 - CONTROL NUMBER IDENTIFIER
control field SIRSI
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240916205721.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150114s2015 inuac b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014955541
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB507652
Source bnb
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780789741158
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0789741156
Qualifying information (paperback)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)903203003
Canceled/invalid control number (OCoLC)754745043
-- (OCoLC)898907835
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8079.C65
Item number H39 2015
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Edition information 23
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Classification number 364.168
Item number H417p
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hayes, Darren Richard,
Relator term author.
245 12 - TITLE STATEMENT
Title A practical guide to computer forensics investigations /
Statement of responsibility, etc. Darren R. Hayes.
246 30 - VARYING FORM OF TITLE
Title proper/short title Computer forensics
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, Indiana, USA :
Name of producer, publisher, distributor, manufacturer Pearson,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 502 pages :
Other physical details illustrations, portraits ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Always learning
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Introduction -- Popular Myths about Computer Forensics -- Types of Computer Forensics Evidence Recovered -- Electronic Mail (Email) -- Images -- Video -- Websites Visited and Internet Searches -- Cellphone Forensics -- What Skills Must a Computer Forensics Investigator Possess? -- Computer Science Knowledge -- Legal Expertise -- Communication Skills -- Linguistic Abilities -- Continuous Learning -- An Appreciation for Confidentiality -- The Importance of Computer Forensics -- Job Opportunities -- A History of Computer Forensics -- 1980's: The Advent of the Personal Computer -- 1990's: The Impact of the Internet -- Training and Education -- Law Enforcement Training -- Summary -- Introduction -- Physical and Logical Storage -- File Storage -- File Conversion and Numbering Formats -- Conversion of Binary to Decimal -- Hexadecimal Numbering -- Conversion of Hexadecimal to Decimal.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents note continued: Conversion of Hexadecimal to ASCII (American Standard Code for Information Interchange) -- Unicode -- Operating Systems -- The Boot Process -- Windows File Systems -- Windows Registry -- Registry Data Types -- FTK Registry Viewer -- Microsoft Windows Features -- Windows Vista -- Windows 7 -- Windows 8.1 -- Summary -- Introduction -- Hard Disk Drives -- Small Computer System Interface (SCSI) -- Integrated Drive Electronics (IDE) -- Serial ATA (SATA) -- Cloning a PATA or SATA Hard Disk -- Cloning Devices -- Removable Memory -- FireWire -- USB Flash Drives -- External Hard Drives -- MultiMedia Cards (MMCs) -- Summary -- References -- Introduction -- Lab Requirements -- American Society of Crime Laboratory Directors -- American Society of Crime Laboratory Directors/Lab Accreditation Board (ASCLD/LAB) -- ASCLD/LAB Guidelines for Forensic Laboratory Management Practices -- Scientific Working Group on Digital Evidence (SWGDE).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents note continued: Private Sector Computer Forensics Laboratories -- Evidence Acquisition Laboratory -- Email Preparation Laboratory -- Inventory Control -- Web Hosting -- Computer Forensics Laboratory Requirements -- Laboratory Layout -- Laboratory Management -- Laboratory Access -- Extracting Evidence from a Device -- Using the dd Utility -- Using Global Regular Expressions Print (GREP) -- Skimmers -- Summary -- Introduction -- Working Undercover -- Generate an Identity -- Generate an Email Account -- Mask Your Identity -- Website Evidence -- Website Archives -- Website Statistics -- Background Searches on a Suspect -- Personal Information: Mailing Address, Email Address, Telephone Number, and Assets -- Personal Interests and Membership of User Groups -- Searching for Stolen Property -- Online Crime -- Identity Theft -- Credit Cards for Sale -- Electronic Medical Records -- Cyberbullying -- Social Networking -- Capturing Online Communications -- Using Screen Captures.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents note continued: Using Video -- Viewing Cookies -- Using Windows Registry -- Summary -- Introduction -- Obtaining Evidence from a Service Provider -- Documenting a Crime Scene -- Seizing Evidence -- Crime Scene Examinations -- Documenting the Evidence -- Completing a Chain of Custody Form -- Completing a Computer Worksheet -- Completing a Hard Disk Drive Worksheet -- Completing a Server Worksheet -- Using Tools to Document an Investigation -- CaseNotes -- FragView -- Helpful Mobile Applications (Apps) -- Network Analyzer -- System Status -- The Cop App -- Lock and Code -- Digital Forensics Reference -- Federal Rules of Civil Procedure (FRCP) -- Federal Rules of Evidence (FREvidence) -- Writing Reports -- Time Zones and Daylight Saving Time (DST) -- Creating a Comprehensive Report -- Using Expert Witnesses at Trial -- The Expert Witness -- The Goals of the Expert Witness -- Preparing an Expert Witness for Trial -- Summary -- Introduction.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents note continued: History and Structure of the United States Legal System -- Origins of the U.S. Legal System -- Overview of the U.S. Court System -- In the Courtroom -- Evidence Admissibility -- Constitutional Law -- First Amendment -- First Amendment and the Internet -- Fourth Amendment -- Fifth Amendment -- Sixth Amendment -- Congressional Legislation -- Rules for Evidence Admissibility -- Criminal Defense -- When Computer Forensics Goes Wrong -- Pornography in the Classroom -- Structure of the Legal System in the European Union (E.U.) -- Origins of European Law -- Structure of European Union Law -- Structure of the Legal System in Asia -- China -- India -- Summary -- Introduction -- The Tools of the Trade -- Networking Devices -- Proxy Servers -- Web Servers -- DHCP Servers -- SMTP Servers -- DNS Servers -- Routers -- IDS -- Firewalls -- Ports -- Understanding the OSI Model -- The Physical Layer -- The Data Link Layer -- The Network Layer -- The Transport Layer.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents note continued: The Session Layer -- The Presentation Layer -- The Application Layer -- Advanced Persistent Threats -- Cyber Kill Chain -- Indicators of Compromise (IOC) -- Investigating a Network Attack -- Summary -- Introduction -- The Cellular Network -- Base Transceiver Station -- Mobile Station -- Cellular Network Types -- SIM Card Forensics -- Types of Evidence -- Handset Specifications -- Memory and Processing -- Battery -- Other Hardware -- Mobile Operating Systems -- Android OS -- Windows Phone -- Standard Operating Procedures for Handling Handset Evidence -- National Institute of Standards and Technology -- Preparation and Containment -- Wireless Capabilities -- Documenting the Investigation -- Handset Forensics -- Cellphone Forensic Software -- Cellphone Forensics Hardware -- Logical versus Physical Examination -- Manual Cellphone Examinations -- Flasher Box -- Global Satellite Service Providers -- Satellite Communication Services -- Legal Considerations.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents note continued: Carrier Records -- Other Mobile Devices -- Tablets -- GPS Devices -- Summary -- Introduction -- Understanding Digital Photography -- File Systems -- Digital Photography Applications and Services -- Examining Picture Files -- Exchangeable Image File Format (EXIF) -- Evidence Admissibility -- Federal Rules of Evidence (FRE) -- Analog vs. Digital Photographs -- Case Studies -- Worldwide Manhunt -- NYPD Facial Recognition Unit -- Summary -- Introduction -- A Brief History -- Macintosh -- Mac Mini with OS X Server -- iPod -- iPhone -- iPad -- Apple Wi-Fi Devices -- Macintosh File Systems -- Forensic Examinations of a Mac -- 10Reg Info -- PMAP Info -- Epoch Time -- Recovering Deleted Files -- Journaling -- DMG File System -- PList Files -- SQLite Databases -- Macintosh Operating Systems -- Mac OS X -- Target Disk Mode -- Apple Mobile Devices -- iOS -- iOS 7 -- iOS 8 -- Security and Encryption -- iPod -- iPhone.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents note continued: Enterprise Deployment of iPhone and iOS Devices -- Case Studies -- Find My iPhone -- Wanted Hactevist -- Michael Jackson -- Stolen iPhone -- Drug Bust -- Summary -- Introduction -- Zacharias Moussaoui -- Background -- Digital Evidence -- Standby Counsel Objections -- Prosecution Affidavit -- Exhibits -- Email Evidence -- BTK (Bind Torture Kill) Killer -- Profile of a Killer -- Evidence -- Cyberbullying -- Federal Anti-harassment Legislation -- State Anti-harassment Legislation -- Warning Signs of Cyberbullying -- What Is Cyberbullying? -- Phoebe Prince -- Ryan Halligan -- Megan Meier -- Tyler Clementi -- Sports -- Summary.
520 ## - SUMMARY, ETC.
Summary, etc. A Practical Guide to Computer Forensics Investigations introduces the newest technologies along with detailed information on how the evidence contained on these devices should be analyzed. Packed with practical, hands-on activities, students will learn unique subjects from chapters including Mac Forensics, Mobile Forensics, Cyberbullying, and Child Endangerment. This well-developed book will prepare students for the rapidly-growing field of computer forensics for a career with law enforcement, accounting firms, banks and credit card companies, private investigation companies, or government agencies.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Evidence, Criminal.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Forensic sciences.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872065
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872484
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Evidence, Criminal.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00917210
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Forensic sciences.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00932011
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Always learning.
949 ## - LOCAL PROCESSING INFORMATION (OCLC)
c c.1
l ON-ORDER
t BOOK
x PRINT
p
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
-- DEWEY
-- 51994001709478
-- 1/2/2020
-- 6/29/2023
-- 2
-- CIRCSTACKS
-- LRC
-- 1
-- $65.00
-- Y
-- Y
-- BOOK
-- 7/26/2018
-- PRINT
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total checkouts Full call number Barcode Copy number Koha item type
    Dewey Decimal Classification     Odessa College Odessa College Stacks 07/26/2018 65.00   364.168 H417P 51994001709478 1 Books