000489583 000__ 01436cam\a2200349\a\4500 000489583 001__ 489583 000489583 005__ 20210513171935.0 000489583 006__ m\\\\\o\\d\\\\\\\\ 000489583 007__ cr\cn||||||||| 000489583 008__ 121015s2013\\\\njua\\\\o\\\\\001\0\eng\d 000489583 010__ $$z 2012038779 000489583 020__ $$z9780470932407 (hbk.) 000489583 020__ $$z9781118221419 (e-book) 000489583 035__ $$a(CaPaEBR)ebr10684909 000489583 035__ $$a(OCoLC)814389964 000489583 040__ $$aCaPaEBR$$cCaPaEBR 000489583 05014 $$aHV8079.C65$$bL395 2013eb 000489583 08204 $$a363.25/968$$223 000489583 1001_ $$aLaykin, Erik. 000489583 24510 $$aInvestigative computer forensics$$h[electronic resource] :$$bthe practical guide for lawyers, accountants, investigators, and business executives /$$cErik Laykin. 000489583 260__ $$aHoboken :$$bJohn Wiley,$$c2013. 000489583 300__ $$axvii, 222 p. :$$bill. 000489583 500__ $$aIncludes index. 000489583 5050_ $$aForeword -- Preface -- This book's setup -- Acknowledgments -- Introduction -- The glue -- A primer on computers and networks -- Computer forensic fundamentals -- Investigative fundamentals -- Index. 000489583 506__ $$aAccess limited to authorized users. 000489583 650_0 $$aComputer crimes$$xInvestigation. 000489583 650_0 $$aComputer security. 000489583 650_0 $$aFraud investigation. 000489583 650_0 $$aCorporations$$xCorrupt practices. 000489583 852__ $$bebk 000489583 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10684909$$zOnline Access 000489583 909CO $$ooai:library.usi.edu:489583$$pGLOBAL_SET 000489583 980__ $$aEBOOK 000489583 980__ $$aBIB 000489583 982__ $$aEbook 000489583 983__ $$aOnline