Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition 🔍
William Oettinger Packt Publishing, Limited; Packt Publishing, 2nd ed., 2022
英语 [en] · PDF · 6.8MB · 2022 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report.
This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process.
By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.
备用文件名
lgli/Learn Computer Forensics - Your One-Stop Guide to Searching, Analyzing, Acquiring, and Securing Digital Evidence (2nd Edition).pdf
备用文件名
lgrsnf/Learn Computer Forensics - Your One-Stop Guide to Searching, Analyzing, Acquiring, and Securing Digital Evidence (2nd Edition).pdf
备用文件名
zlib/Computers/Security/William Oettinger/Learn Computer Forensics - Your One-Stop Guide to Searching, Analyzing, Acquiring, and Securing Digital Evidence_21512716.pdf
备选作者
Oettinger, William
备用版本
Expert insight, Second edition, Birmingham, UK, 2022
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
Packt Publishing, [S.l.], 2022
元数据中的注释
{"edition":"2","isbns":["1803238305","9781803238302"],"last_page":143,"publisher":"Packt Publishing"}
备用描述
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collectedKey FeaturesInvestigate the core methods of computer forensics to procure and secure advanced digital evidence skillfullyRecord the digital evidence collected and organize a forensic examination on itPerform an assortment of Windows scientific examinations to analyze and overcome complex challengesBook DescriptionComputer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report.This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process.By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.What you will learnExplore the investigative process, rules of evidence, legal process, and ethical guidelinesUnderstand the difference between sectors, clusters, volumes, and file slackValidate forensic equipment, computer program, and examination methodsCreate and validate forensically sterile mediaGain the ability to draw conclusions based on the exam discoveriesRecord discoveries utilizing the technically correct terminologyDiscover the limitations and guidelines for RAM Capture and its toolsExplore timeline analysis, media analysis, string searches, and recovery of deleted dataWho this book is forThis book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.
备用描述
Learn Computer Forensics, Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
1 Types of Computer-Based Investigations
Introduction to computer-based investigations
Criminal investigations
First responders
Investigators
Crime scene technician
The crime of stalking
Criminal conspiracy
Corporate investigations
Employee misconduct
Corporate espionage
Insider threat
Case studies
Dennis Rader
Silk Road
San Bernardino terror attack
Theft of intellectual property
Summary
Questions
Further reading
Feedback
2 The Forensic Analysis Process
Pre-investigation considerations
The forensic workstation
The response kit
Forensic software
Forensic investigator training
Understanding case information and legal issues
Understanding data acquisition
Chain of custody
Understanding the analysis process
Dates and time zones
Hash analysis
File signature analysis
Antivirus
Reporting your findings
Details to include in your report
Document facts and circumstances
The report conclusion
Summary
Questions
Further reading
Feedback
3 Acquisition of Evidence
Exploring evidence
Understanding the forensic examination environment
Tool validation
Creating sterile media
Understanding write blocking
Defining forensic imaging
DD image
EnCase evidence file
SSD device
Imaging tools
Summary
Questions
Further reading
Feedback
备用描述
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.
开源日期
2022-05-07
更多信息……
We strongly recommend that you support the author by buying or donating on their personal website, or borrowing in your local library.

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。