Detalles MARC
000 -LEADER |
fixed length control field |
01572nam a2200253 i 4500 |
001 - CONTROL NUMBER |
control field |
C00087418c |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230317144908.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200214s2017 spaa r 000 0 spa d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781787288683 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
043 ## - GEOGRAPHIC AREA CODE |
Geographic area code |
UK |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV 8079 .C65 |
Item number |
.J64 2017 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Johansen, Gerard. |
245 00 - TITLE STATEMENT |
Title |
Digital forensics and incident response : |
Remainder of title |
a practical guide to deploying digital forensic techniques in response to cyber security incidents / |
Statement of responsibility, etc. |
Gerard Johansen. |
250 ## - EDITION STATEMENT |
Edition statement |
First published. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Birmingham, UK : |
Name of publisher, distributor, etc. |
Packt Publishing, |
Date of publication, distribution, etc. |
2017. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
v, 307 páginas : |
Other physical details |
ilustraciones, gráficas, tablas a color ; |
Dimensions |
23 cm. |
500 ## - GENERAL NOTE |
General note |
Material de apoyo Departamento Seguridad Cibernética y de la Información. |
505 1# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Preface, 1 -- |
Title |
Chapter 1. Incident response, 7 -- |
-- |
The incident response process, 8 -- |
-- |
The incident response framework, 12 -- |
-- |
Chapter 2. Forensic fundamentas, 29 -- |
-- |
Legal aspects, 29 -- |
-- |
Digital forensic fundamentals, 32 -- |
-- |
Chapter 3. Network evidence collection, 55 -- |
-- |
Chapter 4. Acquiring host-based evidence, 77 -- |
-- |
Chapter 5. Understanding forensic imaging, 101 -- |
-- |
Chapter 6. Network evidence analysis, 129 -- |
-- |
Chapter 7. Anlyzing system memory, 157 -- |
-- |
Chapter 8. Analyzing system storage, 191 -- |
-- |
Chapter 9. Forensic reporting, 225 -- |
-- |
Chapter 10. Malware analysis, 247 -- |
-- |
Chapter 11. Threat intelligence, 271 -- |
-- |
Index, 301. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Delito informático. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Investigación criminal. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Seguridad en computadores. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Monografía - Colección General |