001401384 000__ 01780nam\a2200469\i\4500 001401384 001__ 1401384 001401384 003__ MiAaPQ 001401384 005__ 20220701003321.0 001401384 006__ m\\\\\o\\d\\\\\\\\ 001401384 007__ cr\cn\nnnunnun 001401384 008__ 170306s2016\\\\enka\\\\o\\\\\001\0\eng\d 001401384 020__ $$a9781783554102 (e-book) 001401384 035__ $$a(MiAaPQ)EBC4594307 001401384 035__ $$a(Au-PeEL)EBL4594307 001401384 035__ $$a(CaPaEBR)ebr11350802 001401384 035__ $$a(CaONFJC)MIL936992 001401384 035__ $$a(OCoLC)953234226 001401384 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 001401384 050_4 $$aHV8079.C65$$bS53 2016 001401384 1001_ $$aShaaban, Ayman,$$eauthor. 001401384 24510 $$aPractical Windows forensics :$$bleverage the power of digital forensics for Windows systems /$$cAyman Shaaban, Konstantin Sapronov. 001401384 264_1 $$aBirmingham :$$bPackt Publishing,$$c2016. 001401384 300__ $$a1 online resource (314 pages) :$$bcolor illustrations. 001401384 336__ $$atext$$2rdacontent 001401384 337__ $$acomputer$$2rdamedia 001401384 338__ $$aonline resource$$2rdacarrier 001401384 4901_ $$aCommunity experience distilled 001401384 500__ $$aIncludes index. 001401384 506__ $$aAccess limited to authorized users. 001401384 588__ $$aDescription based on online resource; title from PDF title page (ebrary, viewed March 6, 2017). 001401384 63000 $$aMicrosoft Windows (Computer file) 001401384 650_0 $$aComputer crimes$$xInvestigation. 001401384 650_0 $$aComputer networks$$xSecurity measures. 001401384 650_0 $$aComputer security. 001401384 655_0 $$aElectronic books 001401384 7001_ $$aSapronov, Konstantin,$$eauthor. 001401384 830_0 $$aCommunity experience distilled. 001401384 852__ $$bebk 001401384 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=4594307$$zOnline Access 001401384 909CO $$ooai:library.usi.edu:1401384$$pGLOBAL_SET 001401384 980__ $$aBIB 001401384 980__ $$aEBOOK 001401384 982__ $$aEbook 001401384 983__ $$aOnline