000439558 000__ 01636cam\a2200421Ia\4500 000439558 001__ 439558 000439558 005__ 20210513153112.0 000439558 006__ m\\\\\o\\d\\\\\\\\ 000439558 007__ cr\un\nnnunnun 000439558 008__ 100319s2010\\\\maua\\\\o\\\\\001\0\eng\d 000439558 019__ $$a558446201$$a608530053$$a764530734$$a765143486 000439558 020__ $$a9781584507086$$q(electronic book) 000439558 020__ $$a158450708X$$q(electronic book) 000439558 020__ $$z9781584506997 000439558 020__ $$z1584506997 000439558 035__ $$a(OCoLC)ocn560659464 000439558 035__ $$a(OCoLC)560659464 000439558 035__ $$a(CaPaEBR)ebr10359308 000439558 035__ $$a439558 000439558 040__ $$aUMI$$beng$$cUMI$$dN$T$$dYDXCP$$dCEF$$dE7B$$dOCLCQ$$dDEBSZ$$dSTF$$dB24X7 000439558 049__ $$aISEA 000439558 050_4 $$aHV8079.C65$$bB76 2010eb 000439558 08204 $$a363.25968$$222 000439558 1001_ $$aBrown, Christopher L. T. 000439558 24510 $$aComputer evidence$$h[electronic resource] :$$bcollection and preservation /$$cChristopher L.T. Brown. 000439558 250__ $$a2nd ed. 000439558 260__ $$aBoston, Mass. :$$bCourse Technology,$$cc2010. 000439558 300__ $$a1 online resource (xxvii, 518 p.) :$$bill. 000439558 504__ $$aIncludes bibliographical references and index. 000439558 506__ $$aAccess limited to authorized users. 000439558 588__ $$aDescription based on print version record. 000439558 650_0 $$aComputer crimes$$xInvestigation. 000439558 77608 $$iPrint version:$$aBrown, Christopher L.T.$$tComputer evidence$$dBoston, Mass. : Course Technology, c2010$$z9781584506997$$w(OCoLC)433451631 000439558 85280 $$bebk$$hEBSCOhost 000439558 85640 $$3EBSCOhost$$uhttps://univsouthin.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=306325$$zOnline Access 000439558 909CO $$ooai:library.usi.edu:439558$$pGLOBAL_SET 000439558 980__ $$aEBOOK 000439558 980__ $$aBIB 000439558 982__ $$aEbook 000439558 983__ $$aOnline 000439558 994__ $$a92$$bISE