MARC details
| 000 -LEADER |
| fixed length control field |
04137nam a2200397 i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250919185142.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
150428s2014 nyua 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780071807913 |
| Qualifying information |
paperback |
| Terms of availability |
RM145.72 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0071807918 |
| Qualifying information |
paperback |
| 039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
| Level of rules in bibliographic description |
201509210948 |
| Level of effort used to assign nonsubject heading access points |
rosli |
| Level of effort used to assign subject headings |
201509041124 |
| Level of effort used to assign classification |
atika |
| Level of effort used to assign subject headings |
201508141100 |
| Level of effort used to assign classification |
rahah |
| y |
04-28-2015 |
| z |
rahah |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
DLC |
| Modifying agency |
YDX |
| -- |
YDXCP |
| -- |
AU@ |
| -- |
BTCTA |
| -- |
BDX |
| -- |
CDX |
| -- |
UKM |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
HV8079.C65W533 3 |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
HV8079.C65 |
| Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
W533 3 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Widup, Suzanne, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Computer forensics and digital investigation with Encase Forensic v7 / |
| Statement of responsibility, etc. |
Suzanne Widup. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
New York : |
| Name of producer, publisher, distributor, manufacturer |
McGraw-Hill Education, |
| Date of production, publication, distribution, manufacture, or copyright notice |
[2014]. |
| 264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Date of production, publication, distribution, manufacture, or copyright notice |
©2014. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xx, 426 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
23 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Source |
rdacarrier |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
'This practical, professional book provides a scenario-based guide to the industry's #1 digital forensics tool, EnCase Forensic Computer Forensics and Digital Investigation with EnCase Forensic shows how to uncover digital evidence in a fast, cost-effective, organized, and repeatable manner using the industry's leading digital investigation software. Part I addresses forensic readiness, setting up the software, and the basic interface. Part II lays out the case study used and how to navigate it step-by-step using the software. Part III details how to find clues and go deeper into investigations (finding hidden and deleted data). Part IV walks you through how to analyze the data, refine, and manipulate the results. Part V discusses the options for automating frequent tasks using EnCase Portable and the EnScript programming language. Sharpens the competitive edge of forensics practitioners through practice with the industry's #1 tool, EnCase Forensic Provides invaluable professional advice on the best working methods of digital forensic specialists An affordable learning option for this widely used tool Walks you through all the latest features to this first major software update in six years--EnCase Forensic v7 performs mobile device forensics (iPad, iPhone, Android, Blackberry, etc.), includes a completely revamped user interface, and streamlined organization of file, data, and report functions Commonly accessible evidence file toolkit allows you to put the book's case examples to the test'-- |
| Assigning source |
Provided by publisher. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
'Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide.- Install EnCase Forensic v7 and customize the user interface - Prepare your investigation and set up a new case - Collect and verify evidence from suspect computers and networks - Use the EnCase Evidence Processor and Case Analyzer - Uncover clues using keyword searches and filter results through GREP - Work with bookmarks, timelines, hash sets, and libraries - Handle case closure, final disposition, and evidence destruction - Carry out field investigations using EnCase Portable - Learn to program in EnCase EnScript |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer crimes |
| General subdivision |
Investigation. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer crimes |
| General subdivision |
Investigation |
| -- |
Computer programs. |
| 907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) |
| a |
.b16132579 |
| b |
2019-11-12 |
| c |
2019-11-12 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
AM |
| Suppress in OPAC |
No |
| Call number prefix |
HV8079.C65W533 3 |
| 914 ## - VTLS Number |
| VTLS Number |
vtls003585126 |
| 990 ## - EQUIVALENCES OR CROSS-REFERENCES [LOCAL, CANADA] |
| Link information for 9XX fields |
nab |
| 991 ## - LOCAL NOTE (NAMA FAKULTI/INSTITUT/PUSAT) |
| a |
Fakulti Teknologi dan Sains Maklumat |
| 998 ## - LOCAL CONTROL INFORMATION (RLIN) |
| Library |
PERPUSTAKAAN LINGKUNGAN KEDUA |
| Operator's initials, OID (RLIN) |
2015-02-04 |
| Cataloger's initials, CIN (RLIN) |
m |
| Material Type (Sierra) |
Printed Books |
| Language |
English |
| Country |
|
| -- |
0 |
| -- |
.b16132579 |