Practical cyber intelligence : (Record no. 7842)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01536cam a22002178i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251223133302.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 240606s2024 nju o 001 0 eng c |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781394256105 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781394256112 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 364.16/8 |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Jakobsen, Adam Tilmar, |
| 245 10 - TITLE STATEMENT | |
| Title | Practical cyber intelligence : |
| Remainder of title | a hands-on guide to digital forensics / |
| Statement of responsibility, etc | Adam Tilmar Jakobsen. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | 1 online resource |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber investigation, many people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond these examples, as it also includes traditional crimes such as theft, fraud, or assault, which can leave behind digital evidence that can be collected and analyzed. In these cases, IT is merely a component of the event. As technology becomes increasingly integrated into our daily lives, the information that we can collect from devices, OSINT, and other sources becomes a critical part of any investigation, allowing us to map out a person's life."-- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer crimes |
| General subdivision | Investigation. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cyber intelligence (Computer security) |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=10896970 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | E-Books |
| Withdrawn status | Lost status | Damaged status | Home library | Current library | Date acquired | Full call number | Accession Number | Bill Date/Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|
| Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | 23/12/2025 | 364.16/8 | EB00781 | 23/12/2025 | E-Books |