000 -LEADER |
fixed length control field |
02348nam a2200301Ia 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230226163913.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190927s9999 xx 000 0 und d |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Brooks, Charles L |
245 #0 - TITLE STATEMENT |
Title |
CHFI : computer hacking forensic investigator certification : |
Remainder of title |
exam guide / |
Statement of responsibility, etc |
Charles L. Brooks. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of Publication |
New York |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of Publisher |
McGraw-Hill Education |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
McGraw-Hill, |
Date of publication, distribution, etc |
[2015] |
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Date of publication, distribution, etc |
c2015 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 DVD |
Dimensions |
(4 3/4 inches). |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
Content type code |
txt |
337 ## - MEDIA TYPE |
Media type term |
computer |
Source |
rdamedia |
Media type code |
c |
338 ## - CARRIER TYPE |
Carrier type term |
computer disc |
Source |
rdacarrier |
Carrier type code |
cr |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
All-in-one certification series |
505 ## - CONTENTS |
Formatted contents note |
Computer forensics today --<br/>The nature of digital evidence --<br/>The investigation process - Computer forensic labs --<br/>Getting the goods --<br/>Spinning rust --<br/>Windows forensics --<br/>Network forensics --<br/>Mobile forensics --<br/>Attacking applications --<br/>The whole truth, and nothing but the truth. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. This guide addresses the tools and techniques required to successfully conduct a computer forensic investigation. Exam topics covered include: computer forensics investigation process; setting up a computer forensics lab; first responder procedures; search and seizure laws; collecting and transporting digital evidence; understanding hard disks and file systems; recovering deleted files and partitions; Windows forensics; forensics investigations using the AccessData Forensic Toolkit (FTK) and Guidance Software's EnCase Forensic; network, wireless, and mobile forensics; investigating Web attacks; preparing investigative reports; and becoming an expert witness. |
526 ## - STUDY PROGRAM INFORMATION NOTE |
-- |
000-099 |
-- |
005.8 |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements for CD-ROM: Windows XP or higher; 30 MB hard disk space; a current or prior major release of Chrome,Firefox, Internet Explorer, or Safari; resolution set to 1024 x 768 or higher; Adobe Acrobat, Adobe Reader, or Adobe Digital Editions. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
General subdivision |
Examinations |
Form subdivision |
Study guides. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Investigation |
-- |
Examinations |
Form subdivision |
Study guides. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Hacking |
General subdivision |
Prevention |
-- |
Examinations |
Form subdivision |
Study guides. |
942 ## - ADDED ENTRY ELEMENTS |
Item type |
CD/DVD |
Source of classification or shelving scheme |
|
Classification part |
005.8 |