The KCAU Library

Image from Google Jackets

Cyber forensics : from data to digital evidence / Albert J. Marcella, Frederic Guillossou.

By: Contributor(s): Material type: TextTextSeries: The Wiley Corporate F&A seriesPublication details: New Jersey : Wiley, 2012.Description: xix, 342 p. : ill. ; 24 cmISBN:
  • 9781118273661
Subject(s): LOC classification:
  • HV8073.5 .M168 2012
Online resources: Summary: "An explanation of the basic principles of data. This book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies. The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information. It inlcudes practical examples and illustrations throughout to guide the reader"--
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Vol info Status Date due Barcode
Main Short Main Short Town Campus Library Non-fiction HV8073.5 .M168 2012 (Browse shelf(Opens below)) 235/22 Available ICAD22090281
Main Long Main Long Martin Oduor-Otieno Library This item is located on the library Second Floor Non-fiction HV8073.5 .M168 2012 (Browse shelf(Opens below)) 27286/14 Available MOOL14061298
Main Long Main Long Martin Oduor-Otieno Library This item is located on the library Second Floor Non-fiction HV8073.5 .M168 2012 (Browse shelf(Opens below)) 27287/14 Available MOOL14061299

Includes bibliographical references and index.

"An explanation of the basic principles of data. This book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies. The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information. It inlcudes practical examples and illustrations throughout to guide the reader"--

There are no comments on this title.

to post a comment.
KCAU Library,
KCA University ,
Thika Road Ruaraka
P. O. Box 56808 – 00200 Nairobi, Kenya

More Links

Powered by Koha