000856621 000__ 01399cam\a2200385Ii\4500 000856621 001__ 856621 000856621 005__ 20230306145145.0 000856621 006__ m\\\\\o\\d\\\\\\\\ 000856621 007__ cr\un\nnnunnun 000856621 008__ 181127s2018\\\\sz\a\\\\o\\\\\000\0\eng\d 000856621 020__ $$a9783030005818$$q(electronic book) 000856621 020__ $$a303000581X$$q(electronic book) 000856621 020__ $$z9783030005801 000856621 0247_ $$a10.1007/978-3-030-00581-8$$2doi 000856621 035__ $$aSP(OCoLC)on1076345858 000856621 035__ $$aSP(OCoLC)1076345858 000856621 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKMGB 000856621 049__ $$aISEA 000856621 050_4 $$aHV8079.C65 000856621 08204 $$a364.16/8$$223 000856621 1001_ $$aLin, Xiaodong$$c(Computer scientist),$$eauthor. 000856621 24510 $$aIntroductory computer forensics :$$ba hands-on practical approach /$$cXiaodong Lin. 000856621 264_1 $$aCham :$$bSpringer,$$c2018. 000856621 300__ $$a1 online resource (xxiii, 577 pages) :$$billustrations 000856621 336__ $$atext$$btxt$$2rdacontent 000856621 337__ $$acomputer$$bc$$2rdamedia 000856621 338__ $$aonline resource$$bcr$$2rdacarrier 000856621 506__ $$aAccess limited to authorized users. 000856621 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 27, 2018). 000856621 650_0 $$aDigital forensic science. 000856621 650_0 $$aComputer crimes$$xInvestigation. 000856621 852__ $$bebk 000856621 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-00581-8$$zOnline Access$$91397441.1 000856621 909CO $$ooai:library.usi.edu:856621$$pGLOBAL_SET 000856621 980__ $$aEBOOK 000856621 980__ $$aBIB 000856621 982__ $$aEbook 000856621 983__ $$aOnline 000856621 994__ $$a92$$bISE