Practical cyber intelligence: a hands-on guide to digital forensics
"Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber i...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
[2024]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781394256099/?ar |
Zusammenfassung: | "Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber investigation, many people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond these examples, as it also includes traditional crimes such as theft, fraud, or assault, which can leave behind digital evidence that can be collected and analyzed. In these cases, IT is merely a component of the event. As technology becomes increasingly integrated into our daily lives, the information that we can collect from devices, OSINT, and other sources becomes a critical part of any investigation, allowing us to map out a person's life."-- |
Beschreibung: | Includes index. - Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 07, 2024) |
Umfang: | 1 Online-Ressource (xxii, 218 Seiten) illustrations (some color) |
ISBN: | 9781394256129 1394256124 9781394256105 1394256108 9781394256112 1394256116 9781394256099 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-106606557 | ||
003 | DE-627-1 | ||
005 | 20240902105238.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240902s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781394256129 |c electronic book |9 978-1-394-25612-9 | ||
020 | |a 1394256124 |c electronic book |9 1-394-25612-4 | ||
020 | |a 9781394256105 |c electronic book |9 978-1-394-25610-5 | ||
020 | |a 1394256108 |c electronic book |9 1-394-25610-8 | ||
020 | |a 9781394256112 |c electronic book |9 978-1-394-25611-2 | ||
020 | |a 1394256116 |c electronic book |9 1-394-25611-6 | ||
020 | |a 9781394256099 |9 978-1-394-25609-9 | ||
035 | |a (DE-627-1)106606557 | ||
035 | |a (DE-599)KEP106606557 | ||
035 | |a (ORHE)9781394256099 | ||
035 | |a (DE-627-1)106606557 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 364.16/8 |2 23/eng/20240628 | |
100 | 1 | |a Jakobsen, Adam Tilmar |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Practical cyber intelligence |b a hands-on guide to digital forensics |c Adam Tilmar Jakobsen |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2024] | |
300 | |a 1 Online-Ressource (xxii, 218 Seiten) |b illustrations (some color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 07, 2024) | ||
520 | |a "Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber investigation, many people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond these examples, as it also includes traditional crimes such as theft, fraud, or assault, which can leave behind digital evidence that can be collected and analyzed. In these cases, IT is merely a component of the event. As technology becomes increasingly integrated into our daily lives, the information that we can collect from devices, OSINT, and other sources becomes a critical part of any investigation, allowing us to map out a person's life."-- | ||
650 | 0 | |a Computer crimes |x Investigation | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Criminalité informatique ; Enquêtes | |
650 | 4 | |a Surveillance des menaces informatiques | |
776 | 1 | |z 9781394256099 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781394256099 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781394256099/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-106606557 |
---|---|
_version_ | 1821494928879910912 |
adam_text | |
any_adam_object | |
author | Jakobsen, Adam Tilmar |
author_facet | Jakobsen, Adam Tilmar |
author_role | aut |
author_sort | Jakobsen, Adam Tilmar |
author_variant | a t j at atj |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)106606557 (DE-599)KEP106606557 (ORHE)9781394256099 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02806nam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-106606557</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240902105238.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240902s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394256129</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-394-25612-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394256124</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-394-25612-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394256105</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-394-25610-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394256108</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-394-25610-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394256112</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-394-25611-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394256116</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-394-25611-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394256099</subfield><subfield code="9">978-1-394-25609-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106606557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP106606557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781394256099</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106606557</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">23/eng/20240628</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jakobsen, Adam Tilmar</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical cyber intelligence</subfield><subfield code="b">a hands-on guide to digital forensics</subfield><subfield code="c">Adam Tilmar Jakobsen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 218 Seiten)</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 07, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber investigation, many people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond these examples, as it also includes traditional crimes such as theft, fraud, or assault, which can leave behind digital evidence that can be collected and analyzed. In these cases, IT is merely a component of the event. As technology becomes increasingly integrated into our daily lives, the information that we can collect from devices, OSINT, and other sources becomes a critical part of any investigation, allowing us to map out a person's life."--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surveillance des menaces informatiques</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781394256099</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781394256099</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781394256099/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-106606557 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:11Z |
institution | BVB |
isbn | 9781394256129 1394256124 9781394256105 1394256108 9781394256112 1394256116 9781394256099 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxii, 218 Seiten) illustrations (some color) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Wiley |
record_format | marc |
spelling | Jakobsen, Adam Tilmar VerfasserIn aut Practical cyber intelligence a hands-on guide to digital forensics Adam Tilmar Jakobsen Hoboken, New Jersey Wiley [2024] 1 Online-Ressource (xxii, 218 Seiten) illustrations (some color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 07, 2024) "Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber investigation, many people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond these examples, as it also includes traditional crimes such as theft, fraud, or assault, which can leave behind digital evidence that can be collected and analyzed. In these cases, IT is merely a component of the event. As technology becomes increasingly integrated into our daily lives, the information that we can collect from devices, OSINT, and other sources becomes a critical part of any investigation, allowing us to map out a person's life."-- Computer crimes Investigation Cyber intelligence (Computer security) Criminalité informatique ; Enquêtes Surveillance des menaces informatiques 9781394256099 Erscheint auch als Druck-Ausgabe 9781394256099 |
spellingShingle | Jakobsen, Adam Tilmar Practical cyber intelligence a hands-on guide to digital forensics Computer crimes Investigation Cyber intelligence (Computer security) Criminalité informatique ; Enquêtes Surveillance des menaces informatiques |
title | Practical cyber intelligence a hands-on guide to digital forensics |
title_auth | Practical cyber intelligence a hands-on guide to digital forensics |
title_exact_search | Practical cyber intelligence a hands-on guide to digital forensics |
title_full | Practical cyber intelligence a hands-on guide to digital forensics Adam Tilmar Jakobsen |
title_fullStr | Practical cyber intelligence a hands-on guide to digital forensics Adam Tilmar Jakobsen |
title_full_unstemmed | Practical cyber intelligence a hands-on guide to digital forensics Adam Tilmar Jakobsen |
title_short | Practical cyber intelligence |
title_sort | practical cyber intelligence a hands on guide to digital forensics |
title_sub | a hands-on guide to digital forensics |
topic | Computer crimes Investigation Cyber intelligence (Computer security) Criminalité informatique ; Enquêtes Surveillance des menaces informatiques |
topic_facet | Computer crimes Investigation Cyber intelligence (Computer security) Criminalité informatique ; Enquêtes Surveillance des menaces informatiques |
work_keys_str_mv | AT jakobsenadamtilmar practicalcyberintelligenceahandsonguidetodigitalforensics |