<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>03222nam a2200337 a 4500</leader>
  <controlfield tag="001">1/45330</controlfield>
  <controlfield tag="008">140825s2007    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781597492232</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">159749223X</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9780080558813 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">008055881X (electronic bk.)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">48290</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">OPELS</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">OPELS</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">N$T</subfield>
   <subfield code="d">IDEBK</subfield>
   <subfield code="d">E7B</subfield>
   <subfield code="d">UMI</subfield>
   <subfield code="d">DEBSZ</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Techno security's guide to e-discovery and digital forensics</subfield>
   <subfield code="h">[electronic resource] /</subfield>
   <subfield code="c">Jack Wiles ... [et al.].</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Burlington, MA :</subfield>
   <subfield code="b">Syngress Pub.,</subfield>
   <subfield code="c">c2007.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xxvi, 405 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Introduction; Authentication; Email Forensics -- Developing an Enterprise Digital Investigative/Electronic Discovery Capability; Advanced Training For Your Electronic Discovery Team; Digital Forensics in a Multi Operating System Environment; Digital Forensic Investigation Operations; Working Together To Build a Regional Forensics Lab; Forensic Examinations in a Terabyte World; Starting a Career In The Field of Techno Forensics -- Degrees, Certifications and Networking; Standards in Digital Forensics; Selecting The Hardware For Your Forensics Computer; Death By a Thousand Cuts; Balancing Records &amp; Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to Presenting The Best You; Mac Forensics.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">&quot;The Training Co.&quot;</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer crimes</subfield>
   <subfield code="x">Investigation.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Wiles, Jack.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140825</subfield>
   <subfield code="p">00b48290</subfield>
   <subfield code="q">00b48290</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781597492232</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48290_9781597492232.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48290_159749223X.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48290_9780080558813.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48290_008055881X.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
 </record>
</collection>
