Computer forensics : (Record no. 953)

MARC details
000 -LEADER
fixed length control field 01752cam a2200229 i 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140110s2015 mauak g b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781449692223 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1449692222 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency AE-FuU
Transcribing agency AE-ShKH
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number KF8947.5
Item number .M37 2015
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Maras, Marie-Helen,
Dates associated with a name 1979-
9 (RLIN) 1872
245 10 - TITLE STATEMENT
Title Computer forensics :
Remainder of title cybercriminals, laws, and evidence /
Statement of responsibility, etc. Marie-Helen Maras, PhD, Associate Professor, John Jay College of Criminal Justice.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Burlington, MA :
Name of publisher, distributor, etc. Jones & Bartlett Learning,
Date of publication, distribution, etc. 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 408 p. :
Other physical details ill. ;
Dimensions 23 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Entering the world of cybercrime -- An introduction to computer forensics investigations and electronic evidence -- Laws regulating access to electronic evidence -- Searches and seizures of computers and electronic evidence -- Cybercrime laws : which statute for which crime? -- Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Where is the electronic evidence and which tools can we use to find it? -- Crime and incident scene : what should an investigator do? -- Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- E-mail forensics -- Network forensics : an introduction -- Mobile devices in computer forensics investigations -- The pretrial and courtroom experiences of a computer forensics investigator.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic evidence
Geographic subdivision United States.
9 (RLIN) 39
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation
Geographic subdivision United States.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
          Main Library University Of Fujairah University Of Fujairah   11/15/2022   KF8947.5 .M37 2015 000685 11/15/2022 C.1 11/15/2022 Book