Mastering windows network forensics and investigation / Steve Anson ... [et al.].

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2012
Edition:2nd ed.
Language:English
Online Access:
Physical Description:xxii, 674 p. :; ill. (some col.)
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500818114
ctrlnum (MiAaPQ)500818114
(Au-PeEL)EBL818114
(CaPaEBR)ebr10580157
(CaONFJC)MIL366226
(OCoLC)795119901
collection bib_alma
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01604nam a2200397 a 4500</leader><controlfield tag="001">500818114</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">111215s2012 inua s 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011945567</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1118163826 (pbk alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781118163825</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118226148 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500818114</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL818114</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10580157</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL366226</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)795119901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">M37 2012</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Mastering windows network forensics and investigation</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Steve Anson ... [et al.].</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Indianapolis :</subfield><subfield code="b">John Wiley &amp; Sons,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxii, 674 p. :</subfield><subfield code="b">ill. (some col.)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anson, Steve.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818114</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>
record_format marc
spelling Mastering windows network forensics and investigation [electronic resource] / Steve Anson ... [et al.].
2nd ed.
Indianapolis : John Wiley & Sons, 2012.
xxii, 674 p. : ill. (some col.)
Includes index.
pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Microsoft Windows (Computer file)
Computer crimes Investigation.
Computer networks Security measures.
Electronic books.
Anson, Steve.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818114 Click to View
language English
format Electronic
eBook
author2 Anson, Steve.
ProQuest (Firm)
author_facet Anson, Steve.
ProQuest (Firm)
ProQuest (Firm)
author2_variant s a sa
author2_role TeilnehmendeR
TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Anson, Steve.
title Mastering windows network forensics and investigation
spellingShingle Mastering windows network forensics and investigation
pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices.
title_full Mastering windows network forensics and investigation [electronic resource] / Steve Anson ... [et al.].
title_fullStr Mastering windows network forensics and investigation [electronic resource] / Steve Anson ... [et al.].
title_full_unstemmed Mastering windows network forensics and investigation [electronic resource] / Steve Anson ... [et al.].
title_auth Mastering windows network forensics and investigation
title_new Mastering windows network forensics and investigation
title_sort mastering windows network forensics and investigation
publisher John Wiley & Sons,
publishDate 2012
physical xxii, 674 p. : ill. (some col.)
edition 2nd ed.
contents pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices.
isbn 9781118226148 (electronic bk.)
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV8079
callnumber-sort HV 48079 C65 M37 42012
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818114
illustrated Illustrated
oclc_num 795119901
work_keys_str_mv AT ansonsteve masteringwindowsnetworkforensicsandinvestigation
AT proquestfirm masteringwindowsnetworkforensicsandinvestigation
status_str n
ids_txt_mv (MiAaPQ)500818114
(Au-PeEL)EBL818114
(CaPaEBR)ebr10580157
(CaONFJC)MIL366226
(OCoLC)795119901
is_hierarchy_title Mastering windows network forensics and investigation
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1792330723306242048