<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" ID="2036">
<titleInfo>
<title>A Practical Guide to Computer Forensics Investigations</title>
</titleInfo>
<name type="Personal Name" authority="">
<namePart>Hayes, Darren R</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<genre authority="marcgt">bibliography</genre>
<originInfo>
<place><placeTerm type="text">USA</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2015</dateIssued>
<issuance>monographic</issuance>
<edition></edition>
</originInfo>
<language>
<languageTerm type="code">en</languageTerm>
<languageTerm type="text">English</languageTerm>
</language>
<physicalDescription>
<form authority="gmd">Text</form>
<extent>502p</extent>
</physicalDescription>
<note>This guide’s practical activities and case studies give you hands-on mastery of modern digital forensics tools and techniques. Its many realistic examples reflect the author’s extensive and pioneering work as a forensics examiner in both criminal and civil investigations.
 
Understand what computer forensics examiners do, and the types of digital evidence they work with
Explore Windows and Mac computers, understand how their features affect evidence gathering, and use free tools to investigate their contents
Extract data from diverse storage devices
Establish a certified forensics lab and implement good practices for managing and processing evidence
Gather data and perform investigations online
Capture Internet communications, video, images, and other content
Write comprehensive reports that withstand defense objections and enable successful prosecution
Follow strict search and surveillance rules to make your evidence admissible
Investigate network breaches, including dangerous Advanced Persistent Threats (APTs)
Retrieve immense amounts of evidence from smartphones, even without seizing them
Successfully investigate financial fraud performed with digital devices
Use digital photographic evidence, including metadata and social media images</note>
<subject authority=""><topic>computer forensics investigations</topic></subject>
<classification>651.8</classification><identifier type="isbn">9780789741158</identifier><location>
<physicalLocation>Podomoro University Digital Library</physicalLocation>
<shelfLocator>651.8 Hay p</shelfLocator>
<holdingSimple>
<copyInformation>
<numerationAndChronology type="1">2017.07.2402</numerationAndChronology>
<sublocation>My Library</sublocation>
<shelfLocator>651.8 Hay p</shelfLocator>
</copyInformation>
<copyInformation>
<numerationAndChronology type="1">2017.10.2889</numerationAndChronology>
<sublocation>My Library</sublocation>
<shelfLocator>651.8 Hay p</shelfLocator>
</copyInformation>
</holdingSimple>
</location>
<slims:image>2017.07.2402.jpg.jpg</slims:image>
<recordInfo>
<recordIdentifier>2036</recordIdentifier>
<recordCreationDate encoding="w3cdtf">2017-06-15 11:44:25</recordCreationDate>
<recordChangeDate encoding="w3cdtf">2017-10-04 14:08:00</recordChangeDate>
<recordOrigin>machine generated</recordOrigin>
</recordInfo></mods></modsCollection>