001415037 000__ 01533nam\a2200433\i\4500 001415037 001__ 1415037 001415037 003__ MiAaPQ 001415037 005__ 20221109003248.0 001415037 006__ m\\\\\o\\d\\\\\\\\ 001415037 007__ cr\cn\nnnunnun 001415037 008__ 170816t20172017inua\\\\o\\\\\001\0\eng\d 001415037 020__ $$a9781119329176 001415037 020__ $$a9781119329183 001415037 020__ $$z9781119328285 001415037 035__ $$a(MiAaPQ)EBC7104514 001415037 035__ $$a(Au-PeEL)EBL7104514 001415037 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 001415037 050_4 $$aTK5105.59$$b.M477 2017 001415037 0820_ $$a005.8$$223 001415037 1001_ $$aMessier, Ric,$$eauthor. 001415037 24510 $$aNetwork forensics /$$cRic Messier. 001415037 264_1 $$aIndianapolis, Indiana :$$bWiley,$$c2017. 001415037 264_4 $$c2017 001415037 300__ $$a1 online resource (332 pages) :$$billustrations (some color). 001415037 336__ $$atext$$2rdacontent 001415037 337__ $$acomputer$$2rdamedia 001415037 338__ $$aonline resource$$2rdacarrier 001415037 500__ $$aIncludes index. 001415037 506__ $$aAccess limited to authorized users. 001415037 588__ $$aDescription based on print version record. 001415037 650_0 $$aComputer networks$$xSecurity measures. 001415037 650_0 $$aInternet$$xSecurity measures. 001415037 655_0 $$aElectronic books 001415037 77608 $$iPrint version:$$aMessier, Ric.$$tNetwork forensics.$$dIndianapolis, Indiana : Wiley, c2017 $$z9781119328285 $$w2017941046 001415037 852__ $$bebk 001415037 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=7104514$$zOnline Access 001415037 909CO $$ooai:library.usi.edu:1415037$$pGLOBAL_SET 001415037 980__ $$aBIB 001415037 980__ $$aEBOOK 001415037 982__ $$aEbook 001415037 983__ $$aOnline