Normal view MARC view

Entry Topical Term

Number of records used in: 1

001 - CONTROL NUMBER

  • control field: 112909

003 - CONTROL NUMBER IDENTIFIER

  • control field: OCoLC

005 - DATE AND TIME OF LATEST TRANSACTION

  • control field: 20210616112948.0

008 - FIXED-LENGTH DATA ELEMENTS

  • fixed length control field: 180117i| anannbabn |a ana c

010 ## - LIBRARY OF CONGRESS CONTROL NUMBER

  • LC control number: sh2018000110

040 ## - CATALOGING SOURCE

  • Original cataloging agency: MTG
  • Language of cataloging: eng
  • Transcribing agency: DLC

150 ## - HEADING--TOPICAL TERM

  • Topical term or geographic name entry element: Digital forensic science

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer and network forensics

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer forensics

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Digital forensics

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Network forensics

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Electronic evidence

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Forensic sciences

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Digital preservation

670 ## - SOURCE DATA FOUND

  • Source citation: Work cat.: Roussev, Vassil. Digital forensic science, 2017:
  • Information found: Abstract, p. viiii ("Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts")

670 ## - SOURCE DATA FOUND

  • Source citation: NIST. Guide to Integrating Forensic Techniques into Incident Response, 2006:
  • Information found: Executive Summary, p. ES-1 ("Digital forensics, also known as computer and network forensics, has many definitions. Generally, it is considered the application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data...Because of the variety of data sources, digital forensic techniques can be used for many purposes, such as investigating crimes and internal policy violations, reconstructing computer security incidents, troubleshooting operational problems, and recovering from accidental system damage")

670 ## - SOURCE DATA FOUND

  • Source citation: John, Jeremy Leighton. Digital Forensics and Preservation, 2012:
  • Information found: Abstract, p. 1 ("In recent years, digital forensics has emerged as an essential source of tools and approaches for facilitating digital preservation and curation, specifically for protecting and investigating evidence from the past")

670 ## - SOURCE DATA FOUND

  • Source citation: National Initiative for Cybersecurity Careers and Studies web site, viewed Feb. 23, 2018
  • Information found: (Digital Forensics: Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations)

670 ## - SOURCE DATA FOUND

  • Source citation: LC database, Feb. 23, 2018
  • Information found: (Computer forensics; network forensics)

680 ## - PUBLIC GENERAL NOTE

  • Explanatory text: Here are entered works on the identification, collection, examination, analysis, and preservation of digital data.

Powered by Koha