Mastering windows network forensics and investigation / Steve Anson ... [et al.].
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2012 |
Edition: | 2nd ed. |
Language: | English |
Online Access: | |
Physical Description: | xxii, 674 p. :; ill. (some col.) |
Notes: | Includes index. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500818114 |
---|---|
ctrlnum |
(MiAaPQ)500818114 (Au-PeEL)EBL818114 (CaPaEBR)ebr10580157 (CaONFJC)MIL366226 (OCoLC)795119901 |
collection |
bib_alma |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01604nam a2200397 a 4500</leader><controlfield tag="001">500818114</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">111215s2012 inua s 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011945567</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1118163826 (pbk alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781118163825</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118226148 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500818114</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL818114</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10580157</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL366226</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)795119901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">M37 2012</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Mastering windows network forensics and investigation</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Steve Anson ... [et al.].</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Indianapolis :</subfield><subfield code="b">John Wiley & Sons,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxii, 674 p. :</subfield><subfield code="b">ill. (some col.)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anson, Steve.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818114</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |
record_format |
marc |
spelling |
Mastering windows network forensics and investigation [electronic resource] / Steve Anson ... [et al.]. 2nd ed. Indianapolis : John Wiley & Sons, 2012. xxii, 674 p. : ill. (some col.) Includes index. pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Microsoft Windows (Computer file) Computer crimes Investigation. Computer networks Security measures. Electronic books. Anson, Steve. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818114 Click to View |
language |
English |
format |
Electronic eBook |
author2 |
Anson, Steve. ProQuest (Firm) |
author_facet |
Anson, Steve. ProQuest (Firm) ProQuest (Firm) |
author2_variant |
s a sa |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Anson, Steve. |
title |
Mastering windows network forensics and investigation |
spellingShingle |
Mastering windows network forensics and investigation pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices. |
title_full |
Mastering windows network forensics and investigation [electronic resource] / Steve Anson ... [et al.]. |
title_fullStr |
Mastering windows network forensics and investigation [electronic resource] / Steve Anson ... [et al.]. |
title_full_unstemmed |
Mastering windows network forensics and investigation [electronic resource] / Steve Anson ... [et al.]. |
title_auth |
Mastering windows network forensics and investigation |
title_new |
Mastering windows network forensics and investigation |
title_sort |
mastering windows network forensics and investigation |
publisher |
John Wiley & Sons, |
publishDate |
2012 |
physical |
xxii, 674 p. : ill. (some col.) |
edition |
2nd ed. |
contents |
pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices. |
isbn |
9781118226148 (electronic bk.) |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV8079 |
callnumber-sort |
HV 48079 C65 M37 42012 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818114 |
illustrated |
Illustrated |
oclc_num |
795119901 |
work_keys_str_mv |
AT ansonsteve masteringwindowsnetworkforensicsandinvestigation AT proquestfirm masteringwindowsnetworkforensicsandinvestigation |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500818114 (Au-PeEL)EBL818114 (CaPaEBR)ebr10580157 (CaONFJC)MIL366226 (OCoLC)795119901 |
is_hierarchy_title |
Mastering windows network forensics and investigation |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330723306242048 |