<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Investigative computer forensics</title>
    <subTitle>the practical guide for lawyers, accountants, investigators, and business executives</subTitle>
  </titleInfo>
  <name type="personal">
    <namePart>Laykin, Erik.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="corporate">
    <namePart>ebrary, Inc</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="local">Electronic books.</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">nju</placeTerm>
    </place>
    <place>
      <placeTerm type="text">Hoboken</placeTerm>
    </place>
    <publisher>John Wiley</publisher>
    <dateIssued>2013</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">electronic</form>
    <form authority="gmd">electronic resource</form>
    <extent>xvii, 222 p. : ill.</extent>
  </physicalDescription>
  <tableOfContents>Foreword -- Preface -- This book's setup -- Acknowledgments -- Introduction -- The glue -- A primer on computers and networks -- Computer forensic fundamentals -- Investigative fundamentals -- Index.</tableOfContents>
  <note type="statement of responsibility">Erik Laykin.</note>
  <note>Includes index.</note>
  <note>Electronic reproduction. Palo Alto, Calif. : ebrary, 2013. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.</note>
  <subject authority="lcsh">
    <topic>Computer crimes</topic>
    <topic>Investigation</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Fraud investigation</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Corporations</topic>
    <topic>Corrupt practices</topic>
  </subject>
  <classification authority="lcc">HV8079.C65 L395 2013eb</classification>
  <classification authority="ddc" edition="23">363.25/968</classification>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="lccn" invalid="yes"/>
  <identifier type="uri">http://site.ebrary.com/lib/rucke/Doc?id=10684909</identifier>
  <location>
    <url>http://site.ebrary.com/lib/rucke/Doc?id=10684909</url>
  </location>
  <recordInfo>
    <recordContentSource authority="marcorg">CaPaEBR</recordContentSource>
    <recordCreationDate encoding="marc">121015</recordCreationDate>
    <recordIdentifier source="CaPaEBR">ebr10684909</recordIdentifier>
  </recordInfo>
</mods>
