Techno security's guide to e-discovery and digital forensics:
This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preser...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
2007
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597492232/?ar |
Zusammenfassung: | This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from USD252 million in 2004 to USD630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be USD1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource (xxvi, 405 Seiten) illustrations |
ISBN: | 9781597492232 159749223X 9780080558813 008055881X |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051701413 | ||
003 | DE-627-1 | ||
005 | 20240228114228.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2007 xx |||||o 00| ||eng c | ||
020 | |a 9781597492232 |9 978-1-59749-223-2 | ||
020 | |a 159749223X |9 1-59749-223-X | ||
020 | |a 9780080558813 |c electronic bk. |9 978-0-08-055881-3 | ||
020 | |a 008055881X |c electronic bk. |9 0-08-055881-X | ||
035 | |a (DE-627-1)051701413 | ||
035 | |a (DE-599)KEP051701413 | ||
035 | |a (ORHE)9781597492232 | ||
035 | |a (DE-627-1)051701413 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a LAW |2 bisacsh | |
082 | 0 | |a 363.25/968 |2 22 | |
245 | 1 | 0 | |a Techno security's guide to e-discovery and digital forensics |c Jack Wiles [and others] |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c 2007 | |
300 | |a 1 Online-Ressource (xxvi, 405 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from USD252 million in 2004 to USD630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be USD1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book. | ||
650 | 0 | |a Computer crimes |x Investigation | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Criminalité informatique ; Enquêtes | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a LAW ; Forensic Science | |
650 | 4 | |a Computer crimes ; Investigation | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a dissertations | |
650 | 4 | |a Academic theses | |
650 | 4 | |a Academic theses | |
650 | 4 | |a Thèses et écrits académiques | |
700 | 1 | |a Wiles, Jack |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597492232 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597492232 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597492232/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051701413 |
---|---|
_version_ | 1821494841187500032 |
adam_text | |
any_adam_object | |
author2 | Wiles, Jack |
author2_role | ctb |
author2_variant | j w jw |
author_facet | Wiles, Jack |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051701413 (DE-599)KEP051701413 (ORHE)9781597492232 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03207cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-051701413</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114228.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492232</subfield><subfield code="9">978-1-59749-223-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749223X</subfield><subfield code="9">1-59749-223-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558813</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055881-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008055881X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055881-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051701413</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051701413</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597492232</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051701413</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Techno security's guide to e-discovery and digital forensics</subfield><subfield code="c">Jack Wiles [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 405 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from USD252 million in 2004 to USD630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be USD1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">LAW ; Forensic Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">dissertations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Academic theses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Academic theses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Thèses et écrits académiques</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wiles, Jack</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597492232</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597492232</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597492232/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051701413 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:47Z |
institution | BVB |
isbn | 9781597492232 159749223X 9780080558813 008055881X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxvi, 405 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Techno security's guide to e-discovery and digital forensics Jack Wiles [and others] Burlington, MA Syngress Pub. 2007 1 Online-Ressource (xxvi, 405 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from USD252 million in 2004 to USD630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be USD1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book. Computer crimes Investigation Computer networks Security measures Computer security Computer Security Criminalité informatique ; Enquêtes Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique LAW ; Forensic Science Computer crimes ; Investigation Computer networks ; Security measures dissertations Academic theses Thèses et écrits académiques Wiles, Jack MitwirkendeR ctb 9781597492232 Erscheint auch als Druck-Ausgabe 9781597492232 |
spellingShingle | Techno security's guide to e-discovery and digital forensics Computer crimes Investigation Computer networks Security measures Computer security Computer Security Criminalité informatique ; Enquêtes Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique LAW ; Forensic Science Computer crimes ; Investigation Computer networks ; Security measures dissertations Academic theses Thèses et écrits académiques |
title | Techno security's guide to e-discovery and digital forensics |
title_auth | Techno security's guide to e-discovery and digital forensics |
title_exact_search | Techno security's guide to e-discovery and digital forensics |
title_full | Techno security's guide to e-discovery and digital forensics Jack Wiles [and others] |
title_fullStr | Techno security's guide to e-discovery and digital forensics Jack Wiles [and others] |
title_full_unstemmed | Techno security's guide to e-discovery and digital forensics Jack Wiles [and others] |
title_short | Techno security's guide to e-discovery and digital forensics |
title_sort | techno security s guide to e discovery and digital forensics |
topic | Computer crimes Investigation Computer networks Security measures Computer security Computer Security Criminalité informatique ; Enquêtes Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique LAW ; Forensic Science Computer crimes ; Investigation Computer networks ; Security measures dissertations Academic theses Thèses et écrits académiques |
topic_facet | Computer crimes Investigation Computer networks Security measures Computer security Computer Security Criminalité informatique ; Enquêtes Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique LAW ; Forensic Science Computer crimes ; Investigation Computer networks ; Security measures dissertations Academic theses Thèses et écrits académiques |
work_keys_str_mv | AT wilesjack technosecuritysguidetoediscoveryanddigitalforensics |