Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008922423/catalog> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- catalog abstract ""The Cyber Crime Investigator's Field Guide provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including preserving the chain of evidence. The Cyber Crime Investigator's Field Guide provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime ... tools that identify the who, where, what, when, why, and how."--Jacket.".
- catalog alternative "Cyber crime field handbook".
- catalog contributor b12529777.
- catalog created "c2002.".
- catalog date "2002".
- catalog date "c2002.".
- catalog dateCopyrighted "c2002.".
- catalog description ""The Cyber Crime Investigator's Field Guide provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including preserving the chain of evidence. The Cyber Crime Investigator's Field Guide provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime ... tools that identify the who, where, what, when, why, and how."--Jacket.".
- catalog description "Includes bibliographical references and index.".
- catalog description "The Initial Contact -- Client Site Arrival -- Evidence Collection Procedures -- Detailed Procedures for Obtaining a Bitstream Backup of a Hard Drive -- Evidence Collection and Analysis Tools -- SafeBack -- GetTime -- FileList, FileCnvt, and Excel -- GetFree -- Swap Files and GetSwap -- GetSlack -- Temporary Files -- Filter_I -- Key Word Generation -- TextSearch Plus -- CRCMD5 -- DiskSig -- Doc -- Mcrypt -- Micro-Zap -- M-Sweep -- Net Threat Analyzer -- AnaDisk -- Seized -- Scrub -- Spaces -- NTFS FileList -- NTFS GetFree -- NTFS GetSlack -- NTFS View -- NTFS Check -- NTIcopy -- Disk Search 32 -- EnCase -- Analyst's Notebook, iBase, and iGlass -- BackTracing -- Password Recovery -- Questions and Answers by Subject Area -- Evidence Collection -- Legal -- Evidence Analysis -- UNIX -- Military -- Hackers -- BackTracing -- Logs -- Encryption -- Government -- Networking -- E-Mail -- Usenet and IRC (Chat) -- Recommended Reference Materials -- Perl and C Scripts -- UNIX, Windows, NetWare, and Macintosh -- Computer Internals -- Computer Networking -- Web Sites of Interest -- Recommendations -- Port Numbers Used by Malicious Trojan Horse Programs -- Attack Signatures -- UNIX/Linux Commands -- Cisco PIX Firewall Commands -- Discovering Unauthorized Access to Your Computer -- U.S. Department of Justice Search and Seizure Guidelines -- Searching and Seizing Computers without a Warrant -- Searching and Seizing Computers with a Warrant -- The Electronic Communications Privacy Act.".
- catalog extent "x, 348 p. :".
- catalog identifier "0849311926 (pbk. : alk. paper)".
- catalog issued "2002".
- catalog issued "c2002.".
- catalog language "eng".
- catalog publisher "Boca Raton, FL : CRC Press,".
- catalog subject "363.25/968 21".
- catalog subject "Computer crimes Investigation Handbooks, manuals, etc.".
- catalog subject "HV8079.C65 M53 2002".
- catalog tableOfContents "The Initial Contact -- Client Site Arrival -- Evidence Collection Procedures -- Detailed Procedures for Obtaining a Bitstream Backup of a Hard Drive -- Evidence Collection and Analysis Tools -- SafeBack -- GetTime -- FileList, FileCnvt, and Excel -- GetFree -- Swap Files and GetSwap -- GetSlack -- Temporary Files -- Filter_I -- Key Word Generation -- TextSearch Plus -- CRCMD5 -- DiskSig -- Doc -- Mcrypt -- Micro-Zap -- M-Sweep -- Net Threat Analyzer -- AnaDisk -- Seized -- Scrub -- Spaces -- NTFS FileList -- NTFS GetFree -- NTFS GetSlack -- NTFS View -- NTFS Check -- NTIcopy -- Disk Search 32 -- EnCase -- Analyst's Notebook, iBase, and iGlass -- BackTracing -- Password Recovery -- Questions and Answers by Subject Area -- Evidence Collection -- Legal -- Evidence Analysis -- UNIX -- Military -- Hackers -- BackTracing -- Logs -- Encryption -- Government -- Networking -- E-Mail -- Usenet and IRC (Chat) -- Recommended Reference Materials -- Perl and C Scripts -- UNIX, Windows, NetWare, and Macintosh -- Computer Internals -- Computer Networking -- Web Sites of Interest -- Recommendations -- Port Numbers Used by Malicious Trojan Horse Programs -- Attack Signatures -- UNIX/Linux Commands -- Cisco PIX Firewall Commands -- Discovering Unauthorized Access to Your Computer -- U.S. Department of Justice Search and Seizure Guidelines -- Searching and Seizing Computers without a Warrant -- Searching and Seizing Computers with a Warrant -- The Electronic Communications Privacy Act.".
- catalog title "Cyber crime field handbook".
- catalog title "Cyber crime investigator's field guide / Bruce Middleton.".
- catalog type "Handbooks, manuals, etc. fast".
- catalog type "text".