01279cam a22002895a 45000010009000000050017000090080041000260200038000670200035001050400060001400820028002002450190002282600048004183000034004665000024005006500050005246500036005746500055006106500054006656510010007196530025007297000023007547000026007779420008008039990017008119520161008281620699620201128021438.0100428t2010 maua fr 001 0 eng d a9781597495370 (pbk. : alk. paper) a1597495379 (pbk. : alk. paper) aDLCcDLCdYDXdYDXCPdCDXdBWXdUKMdDLCdEG-ScBUEbeng04a363.2502854678222bDIG00aDigital forensics for network, internet, and cloud computing :ba forensic evidence guide for moving targets and data /cTerrence V. Lillard ... [et al.] ; technical editor, Jim Murray. aBurlington :bSyngress / Elsevier,cc.2010. axii, 353 p. :bill. ;c24 cm. aIndex : p. 349-353. 0aComputer crimesxInvestigation.2BUEsh911331 7aComputer security.2BUEsh92637 7aComputer networksxSecurity measures.2BUEsh92634 0aCloud computingxSecurity measures.2BUEsh937309 2BUEsh bCOMSCIcDecember20151 aLillard, Terrence.1 aMurray, Jim,eeditor. 2ddc c20366d20338 00102ddc40708BaccahaMAINbMAINc1STd2015-07-27ePurchaseg560.00h21759l2o363.2502854678 DIGp000039595r2025-07-15 00:00:00s2023-03-11v700.00yBB