<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" ID="1715">
<titleInfo>
<title>Computer Forensics and Digital Investigation with EnCase Forensic v7</title>
</titleInfo>
<name type="Personal Name" authority="">
<namePart>Widup, Suzanne</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<genre authority="marcgt">bibliography</genre>
<originInfo>
<place><placeTerm type="text">USA</placeTerm></place>
<publisher>McGraw-Hill</publisher>
<dateIssued>2014</dateIssued>
<issuance>monographic</issuance>
<edition>1st</edition>
</originInfo>
<language>
<languageTerm type="code">en</languageTerm>
<languageTerm type="text">English</languageTerm>
</language>
<physicalDescription>
<form authority="gmd">Text</form>
<extent>426p</extent>
</physicalDescription>
<note>Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide.</note>
<subject authority=""><topic>Computer Application for Management</topic></subject>
<classification>651.8</classification><identifier type="isbn">9780071807913</identifier><location>
<physicalLocation>Podomoro University Digital Library</physicalLocation>
<shelfLocator>651.8 Wid c</shelfLocator>
<holdingSimple>
<copyInformation>
<numerationAndChronology type="1">2017.05.1991</numerationAndChronology>
<sublocation>My Library</sublocation>
<shelfLocator>651.8 Wid c</shelfLocator>
</copyInformation>
<copyInformation>
<numerationAndChronology type="1">2017.05.1992</numerationAndChronology>
<sublocation>My Library</sublocation>
<shelfLocator>651.8 Wid c</shelfLocator>
</copyInformation>
<copyInformation>
<numerationAndChronology type="1">2017.08.2660</numerationAndChronology>
<sublocation>My Library</sublocation>
<shelfLocator>651.8 Wid c</shelfLocator>
</copyInformation>
<copyInformation>
<numerationAndChronology type="1">2017.08.2661</numerationAndChronology>
<sublocation>My Library</sublocation>
<shelfLocator>651.8 Wid c</shelfLocator>
</copyInformation>
</holdingSimple>
</location>
<slims:image>Computer_Forensic_Digital_investigation.jpg.jpg</slims:image>
<recordInfo>
<recordIdentifier>1715</recordIdentifier>
<recordCreationDate encoding="w3cdtf">2017-05-02 17:05:15</recordCreationDate>
<recordChangeDate encoding="w3cdtf">2017-08-09 10:26:37</recordChangeDate>
<recordOrigin>machine generated</recordOrigin>
</recordInfo></mods></modsCollection>