000 01603nam a22001937a 4500
999 _c36123
_d36123
003 OSt
020 _a9788131519462
082 _a363.25968 NEL-G
100 _aNelson, Bell
245 _aGuide to Computer Forensics and Investigations
250 _a4th
260 _aDelhi
_bCenage Learning
_c2010
300 _a682p.
500 _a1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. 10: Recovering Graphics Files. 11: Virtual Machines, Network Forensics, and Live Acquisitions. 12: E-mail Investigations. 13: Cell Phone and Mobile Device Forensics. 14: Report Writing for High-Tech Investigations. 15: Expert Testimony in High-Tech Investigations. 16: Ethics and High-Tech Investigations. Appendix A: Certification and Testing Processes for Computer Forensics. Appendix B: ComputerForensics References. Appendix C: Computer Forensics Lab Configuration. Appendix D: DOS-Based Computer Forensics Tools.
650 _aOther social problems & services
856 _uhttps://books.google.co.in/books?id=PSMFAAAAQBAJ&printsec=frontcover&dq=guide+to+computer+forensics+and+investigations+by+nelson&hl=en&sa=X&ved=0ahUKEwio_fP3uKXnAhWEA3IKHcaQA-YQ6AEIMzAB#v=onepage&q=guide%20to%20computer%20forensics%20and%20investigations%20by%20nelson&f=false
901 _a24727
942 _2ddc
_cBK