Computer forensics jumpstart:
Annotation
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Indianopolis, Ind.
Wiley Pub.
2011
|
Ausgabe: | 2nd ed. |
Schriftenreihe: | Sybex serious skills
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781118067659/?ar |
Zusammenfassung: | Annotation |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource. |
ISBN: | 9781118067574 1118067576 9781118067659 1118067657 9781118067642 1118067649 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047525436 | ||
003 | DE-627-1 | ||
005 | 20241129125339.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2011 xx |||||o 00| ||eng c | ||
020 | |a 9781118067574 |c electronic bk. |9 978-1-118-06757-4 | ||
020 | |a 1118067576 |c electronic bk. |9 1-118-06757-6 | ||
020 | |a 9781118067659 |c electronic bk. |9 978-1-118-06765-9 | ||
020 | |a 1118067657 |c electronic bk. |9 1-118-06765-7 | ||
020 | |a 9781118067642 |c electronic bk. |9 978-1-118-06764-2 | ||
020 | |a 1118067649 |c electronic bk. |9 1-118-06764-9 | ||
035 | |a (DE-627-1)047525436 | ||
035 | |a (DE-599)KEP047525436 | ||
035 | |a (ORHE)9781118067659 | ||
035 | |a (DE-627-1)047525436 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 0 | 0 | |a Computer forensics jumpstart |c Michael Solomon [and others] |
250 | |a 2nd ed. | ||
264 | 1 | |a Indianopolis, Ind. |b Wiley Pub. |c 2011 | |
300 | |a 1 Online-Ressource. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Sybex serious skills | |
500 | |a Includes bibliographical references and index | ||
520 | |a Annotation | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer crimes |x Investigation | |
650 | 0 | |a Forensic sciences | |
650 | 2 | |a Computer Security | |
650 | 2 | |a Forensic Sciences | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Criminalité informatique ; Enquêtes | |
650 | 4 | |a Criminalistique | |
650 | 4 | |a forensic science | |
650 | 4 | |a Computer crimes ; Investigation | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Forensic sciences | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Forensic sciences | |
700 | 1 | |a Solomon, Michael |d 1963- |e VerfasserIn |4 aut | |
776 | 1 | |z 9780470931660 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780470931660 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781118067659/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | 1 | |a ZDB-30-ORH |d 20241129 | |
912 | 1 | |a ZDB-30-ORH |d 20241129 | |
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047525436 |
---|---|
_version_ | 1831287135502598144 |
adam_text | |
any_adam_object | |
author | Solomon, Michael 1963- |
author_facet | Solomon, Michael 1963- |
author_role | aut |
author_sort | Solomon, Michael 1963- |
author_variant | m s ms |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047525436 (DE-599)KEP047525436 (ORHE)9781118067659 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02341cam a22006612c 4500</leader><controlfield tag="001">ZDB-30-ORH-047525436</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241129125339.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118067574</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-06757-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118067576</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-06757-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118067659</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-06765-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118067657</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-06765-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118067642</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-06764-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118067649</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-06764-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047525436</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047525436</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118067659</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047525436</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Computer forensics jumpstart</subfield><subfield code="c">Michael Solomon [and others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianopolis, Ind.</subfield><subfield code="b">Wiley Pub.</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Sybex serious skills</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Annotation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Forensic Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalistique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Solomon, Michael</subfield><subfield code="d">1963-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780470931660</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780470931660</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118067659/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1="1" ind2=" "><subfield code="a">ZDB-30-ORH</subfield><subfield code="d">20241129</subfield></datafield><datafield tag="912" ind1="1" ind2=" "><subfield code="a">ZDB-30-ORH</subfield><subfield code="d">20241129</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047525436 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:07Z |
institution | BVB |
isbn | 9781118067574 1118067576 9781118067659 1118067657 9781118067642 1118067649 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley Pub. |
record_format | marc |
series2 | Sybex serious skills |
spelling | Computer forensics jumpstart Michael Solomon [and others] 2nd ed. Indianopolis, Ind. Wiley Pub. 2011 1 Online-Ressource. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Sybex serious skills Includes bibliographical references and index Annotation Computer security Computer networks Security measures Computer crimes Investigation Forensic sciences Computer Security Forensic Sciences Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Enquêtes Criminalistique forensic science Computer crimes ; Investigation Computer networks ; Security measures Solomon, Michael 1963- VerfasserIn aut 9780470931660 Erscheint auch als Druck-Ausgabe 9780470931660 |
spellingShingle | Solomon, Michael 1963- Computer forensics jumpstart Computer security Computer networks Security measures Computer crimes Investigation Forensic sciences Computer Security Forensic Sciences Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Enquêtes Criminalistique forensic science Computer crimes ; Investigation Computer networks ; Security measures |
title | Computer forensics jumpstart |
title_auth | Computer forensics jumpstart |
title_exact_search | Computer forensics jumpstart |
title_full | Computer forensics jumpstart Michael Solomon [and others] |
title_fullStr | Computer forensics jumpstart Michael Solomon [and others] |
title_full_unstemmed | Computer forensics jumpstart Michael Solomon [and others] |
title_short | Computer forensics jumpstart |
title_sort | computer forensics jumpstart |
topic | Computer security Computer networks Security measures Computer crimes Investigation Forensic sciences Computer Security Forensic Sciences Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Enquêtes Criminalistique forensic science Computer crimes ; Investigation Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Computer crimes Investigation Forensic sciences Computer Security Forensic Sciences Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Enquêtes Criminalistique forensic science Computer crimes ; Investigation Computer networks ; Security measures |
work_keys_str_mv | AT solomonmichael computerforensicsjumpstart |