Cyber Forensics: (Record no. 27826)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02731nam a2200253Ia 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20260116133741.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 260116s9999 xx 000 0 und d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9780367524241 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 ALB-C |
| 100 ## - MAIN ENTRY--AUTHOR | |
| Author Name | (Edited By) Albert J. Marcella |
| 245 #0 - TITLE STATEMENT | |
| Title | Cyber Forensics: |
| Sub-Title | Examining Emerging And Hybrid Technologies |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of Publication | Boca Raton |
| Date of publication, distribution, etc. | 2022 |
| Name of publisher, distributor, etc. | CRC Press |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pages | xvii, 363 p. |
| 500 ## - GENERAL NOTE | |
| General note | Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Subject / Department | Artificial Intelligence |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Subject / Department | Computer Science |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Subject / Department | Computers / Internet / Online Safety & Privacy Computers / Security / General Computers / Security / Network Security Law / Forensic Science Technology & Engineering / Electronics / Digital |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Subject / Department | Creative Technology |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Subject / Department | Cybersecurityt |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Subject / Department | Data Science |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Subject / Department | Programing |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Subject / Department | Software Engineering |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Book |
| Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Shelving Location | Date acquired | Source of acquisition | Price | Inventory number | Full Call Number | Accession No./Barcode | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cyber Security | Air University Central Library Islamabad | Air University Central Library Islamabad | 01/02/2023 | Vanguard Books | 8533.00 | 33792 | 005.8 ALB-C | P13461 | Book |







