安娜的档案需要您的帮助! 许多人试图关停我们,但我们会奋起反击。
➡️ 如果您现在捐赠,您将获得 双倍 的快速下载次数。 有效期至本月底。 捐赠
✕

安娜的档案

📚 人类历史上最大的完全开放的图书馆。 📈 61,654,285 本图书、95,687,150 篇论文被永久保存。
AA 38TB
direct uploads
IA 304TB
scraped by AA
DuXiu 298TB
scraped by AA
Hathi 9TB
scraped by AA
Libgen.li 188TB
collab with AA
Z-Lib 77TB
collab with AA
Libgen.rs 82TB
mirrored by AA
Sci-Hub 90TB
mirrored by AA
⭐️ Our code and data are 100% open source. 了解更多……
✕ 近期下载:  
主页 主页 主页 主页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗
搜索搜索 捐赠 x2捐赠 x2
账户账户
搜索设置
排序
高级
增加特定搜索字段
内容
文件类型 open our viewer
更多……
访问方式
来源
语言
更多……
显示
Search settings
下载 期刊文章 数字借阅 元数据
结果集 1-50(总计 52+)
duxiu/initial_release/12848658.zip
网络犯罪侦查 : 实验基础 = Wangluo fanzui zhencha : shiyan jichu 许爱东,廖根为编著, 许, 爱东 北京市:北京大学出版社, 2011.08, 2011
1 (p1): 第一章 网络犯罪调查基础实验1 (p1-1): 第一节Autoruns软件操作实验9 (p1-2): 第二节WinHex使用实验20 (p1-3): 第三节WinPE制作与使用实验29 (p1-4): 第四节 局域网组建基础知识34 (p1-5): 第五节 组建局域网与接入Internet实验35 (p1-6): 本章小结35 (p1-7): 拓展阅读文献36 (p2): 第二章 数字证据检索实验36 (p2-1): 第一节 数字证据检索预备知识47 (p2-2): 第二节 数字证据检索实验49 (p2-3): 本章小结49 (p2-4): 拓展阅读文献50 (p3): 第三章 数字证据收集实验50 (p3-1): 第一节 数字证据收集预备知识69 (p3-2): 第二节Windows平台易失性数据收集实验70 (p3-3): 第三节Linux平台易失性数据收集实验71 (p3-4): 第四节 数字证据完全收集预备知识79 (p3-5): 第五节Logicube PFL完全收集数字证据实验81 (p3-6): 本章小结81 (p3-7): 拓展阅读文献82 (p4): 第四章 数据恢复实验82 (p4-1): 第一节 数据恢复预备知识88 (p4-2): 第二节EasyRecovery恢复被删除文件实验90 (p4-3): 第三节FAT文件系统基础知识101 (p4-4): 第四节FAT文件系统分析与删除文件复原实验103 (p4-5): 第五节NTFS文件系统分析与删除文件复原实验105 (p4-6): 第六节EXT3文件系统分析与删除文件复原实验106 (p4-7): 本章小结106 (p4-8): 拓展阅读文献107 (p5): 第五章 数字证据调查综合实验107 (p5-1): 第一节UTK软件基础知识127 (p5-2): 第二节EnCase软件基础知识150 (p5-3): 第三节FTK综合分析实验151 (p5-4): 第四节EnCase综合分析实验152 (p5-5): 本章小结152 (p5-6): 拓展阅读文献153 (p6): 第六章 电子数据鉴定实验153 (p6-1): 第一节 电子数据鉴定预备知识161 (p6-2): 第二节 电子邮件真伪检验实验186 (p6-3): 本章小结186 (p6-4): 拓展阅读文献187 (p7): 第七章 恶意代码行为分析实验187 (p7-1): 第一节 恶意代码基本知识197 (p7-2): 第二节 木马程序自启动实验200 (p7-3): 第三节 内存中寻找可疑证据实验201 (p7-4): 第四节PE文件异常检测和分析202 (p7-5): 本章小结202 (p7-6): 拓展阅读文献203 (p8): 第八章 数据保密与数字签名实验203 (p8-1): 第一节 数据保密实验预备知识215 (p8-2): 第二节PGP实现电子邮件签名216 (p8-3): 本章小结216 (p8-4): 拓展阅读文献217 (p9): 第九章 网络犯罪案件侦查相关法律问题217 (p9-1): 第一节 网络犯罪案件侦查相关法律问题219 (p9-2): 第二节 网络犯罪案件侦查相关法律问题讨论实验220 (p9-3): 本章小结220 (p9-4): 拓展阅读文献221 (p10): 附 录 网络犯罪相关法律节选221 (p10-1): 中华人民共和国刑法(节选)228 (p10-2): 中华人民共和国刑法修正案(七)(节选)229 (p10-3): 最高人民法院、最高人民检察院关于执行《中华人民共和国刑法》确定罪名的补充规定(四)(节选)230 (p10-4): 全国人民代表大会常务委员会关于维护互联网安全的决定232 (p10-5): 中华人民共和国治安管理处罚法(节选)234 (p10-6): 中华人民共和国电子签名法239 (p10-7): 计算机软件保护条例(2002年)244 (p10-8): 信息网络传播权保护条例249 (p10-9): 中华人民共和国计算机信息网络国际联网管理暂行规定252 (p10-10): 中华人民共和国计算机信息网络国际联网管理暂行规定实施办法256 (p10-11): 互联网信息服务管理办法259 (p10-12): 互联网上网服务营业场所管理条例265 (p10-13): 中华人民共和国计算机信息系统安全保护条例268 (p10-14): 中华人民共和国电信条例280 (p10-15): 中国互联网络域名管理办法(2004年)286 (p10-16):...
更多信息……
中文 [zh] · PDF · 52.1MB · 2011 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11060.0, final score: 167462.67
upload/airitibooks/P20150318026_9789862017609_科技犯罪安全之數位鑑識:證據力與行動智慧應用.pdf
科技犯罪安全之數位鑑識: zheng ju li yu xing dong zhi hui ying yong = Digital forensics and security in applications of computer and mobile systems Wang Xuzheng, Lin Zhuxing, Zuo Ruilin zhu Bo shuo wen hua gu fen you xian gong si, Chu ban., Xinbei Shi Xizhi Qu, China (Republic : 1949- ), 2013
由於電腦與網路的快速發展和普及應用,依賴傳統證據為主的鑑識方法,已經不足以對抗科技導向的資訊犯罪案件,基於現今人們交流的資料大都已電子化,一旦稍有不慎都將導致資訊犯罪案件不斷出現。為了因應新型態的高科技犯罪,本書除了電腦犯罪、網路安全、鑑識理論與數位證據偵蒐程序之外,更進一步編入智慧手機、社交平台與雲端存取實務的觀念,探討在各種可能情境下,如何於不同的作業系統平台(MOBILE OS/WINDOWS/UNIX/LINUX),進行高科技犯罪的趨勢與數位鑑識/證據的調查與追蹤。 全書共分十二章,先從數位證據之於科技犯罪的判定為何開始說起,再逐步介紹偽裝學的基礎知識與研究範疇、木馬抗辯相關議題及鑑識實例、智慧型裝置的鑑識能力、不同作業系統平台如何進行鑑識工作/工具的程序/操作、網際網路的數位證據如何辨別及蒐集、密碼學與資訊安全,以及網路安全機制等重點,使讀者循序漸進地了解完整且實用的鑑識科技。
更多信息……
中文 [zh] · PDF · 103.2MB · 2013 · 📗 未知类型的图书 · 🚀/upload · Save
base score: 10963.0, final score: 167398.77
ia/xbox360forensics0000bolt.pdf
Xbox 360 Forensics: a digital forensics guide to examining artifacts / Steven Bolt, Samuel Liles (technical editor) Steven Bolt, Samuel Liles, technical editor Elsevier; Elsevier / Syngress, Elsevier Ltd., Burlington, MA, 2011
XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evidence to assist in your next criminal investigation. The digital forensics community has already begun to receive game consoles for examination, but there is currently no map for you to follow as there may be with other digital media. XBOX 360 Forensics provides that map and presents the information in an easy-to-read, easy-to-reference format.This book is organized into 11 chapters that cover topics such as Xbox 360 hardware; XBOX LIVE; configuration of the console; initial forensic acquisition and examination; specific file types for Xbox 360; Xbox 360 hard drive; post-system update drive artifacts; and XBOX Live redemption code and Facebook.This book will appeal to computer forensic and incident response professionals, including those in federal government, commercial/private sector contractors, and consultants. Game consoles are routinely seized and contain evidence of criminal activity Author Steve Bolt wrote the first whitepaper on XBOX investigations
更多信息……
英语 [en] · PDF · 17.6MB · 2011 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17483.475
ia/digitalarchaeolo0000grav.pdf
Digital Archaeology : The Art and Science of Digital Forensics Michael W Graves Addison-Wesley Professional; Addison-Wesley, Pearson Education (US), Upper Saddle River, NJ, 2013
The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital Archaeology, expert practitioner Michael Graves has written the most thorough, realistic, and up-to-date guide to the principles and techniques of modern digital forensics. Graves begins by providing a solid understanding of the legal underpinnings of and critical laws affecting computer forensics, including key principles of evidence and case law. Next, he explains how to systematically and thoroughly investigate computer systems to unearth crimes or other misbehavior, and back it up with evidence that will stand up in court. Drawing on the analogy of archaeological research, Graves explains each key tool and method investigators use to reliably uncover hidden information in digital systems. His detailed demonstrations often include the actual syntax of command-line utilities. Along the way, he presents exclusive coverage of facilities management, a full chapter on the crucial topic of first response to a digital crime scene, and up-to-the-minute coverage of investigating evidence in the cloud. Graves concludes by presenting coverage of important professional and business issues associated with building a career in digital forensics, including current licensing and certification requirements. Topics Covered Include Acquiring and analyzing data in ways consistent with forensic procedure Recovering and examining e-mail, Web, and networking activity Investigating users'behavior on mobile devices Overcoming anti-forensics measures that seek to prevent data capture and analysis Performing comprehensive electronic discovery in connection with lawsuits Effectively managing cases and documenting the evidence you find Planning and building your career in digital forensics Digital Archaeology is a key resource for anyone preparing for a career as a professional investigator; for IT professionals who are sometimes called upon to assist in investigations; and for those seeking an explanation of the processes involved in preparing an effective defense, including how to avoid the legally indefensible destruction of digital evidence.
更多信息……
英语 [en] · PDF · 34.5MB · 2013 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17483.26
nexusstc/XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts/3a6a6152c814c3dfb69723d46c3c21ac.pdf
XBOX 360 Forensics : A Digital Forensics Guide to Examining Artifacts Steven Bolt, Samuel Liles, technical editor Elsevier; Elsevier / Syngress, 1, PT, 2011
<p>Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the likelihood that a criminal investigator encounters an XBOX 360 is a certainty. The digital forensics community has already begun to receive game consoles for examination, but there is no map for them to follow as there may be with other digital media. <i>XBOX 360 Forensics</i> provides that map and present the information for the examiners in an easy to read, easy to read format. </p><br><br><ul><li>Game consoles are routinely seized and contain evidence of criminal activity</li></ul> <ul> <p><li>Author Steve Bolt wrote the first whitepaper on XBOX investigations</li> </ul>
更多信息……
英语 [en] · PDF · 22.1MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17482.31
ia/investigatorsgui0000fran.pdf
The Investigator's Guide to Computer Crime Franklin, Carl J., 1958- Charles C. Thomas Publisher, Limited, Charles C Thomas Publisher, Springfield, Ill, 2006
With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. Section I establishes standards for computer crime investigation, the computer crime investigation team, the computer system in criminal enterprise, the computer crime lab, expert assistance, and what the experts can do for your investigation. Section 2 deals with hardware and software crimes, theft of information, cyberstalking, identity theft, and exemplary federal cases. Section 3 focuses on the computer crime investigation, initial assessment and response, applying forensic science techniques, the basics of tracking the offender, and basic network systems. Section 4 deals with search, seizure, digital evidence, the Fourth Amendment principles and computer searches, general rules of consent, informants, undercover operatives, and the application of direct and circumstantial evidence. The appendices contain a wealth of information on identifying the computer components, understanding software, networks and communication systems, and a computer seizure checklist. This text will be a useful resource for law enforcement professionals, criminal justice students, security professionals, and private business.<BR/>
更多信息……
英语 [en] · PDF · 23.2MB · 2006 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17482.096
nexusstc/Critical Concepts, Standards, and Techniques in Cyber Forensics (Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT))/5ca5389aaf1d2b6ef4a5944fbbd461a3.epub
Critical Concepts, Standards, and Techniques in Cyber Forensics (Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT)) Mohammad Zunnun Khan (editor) Information Science Reference (an imprint of IGI Global), 1, 2019
Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.
更多信息……
英语 [en] · EPUB · 6.6MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17481.9
ia/guidetocomputerf5thedition0000nels_t5o2.pdf
Guide to computer forensics and investigations : processing digital evidence Bill Nelson, Amelia Phillips, Christopher Steuart, Frank Enfinger CENGAGE Learning Custom Publishing, 5th edition /, Boston, Massachusetts, 2016
xxv, 655 pages : 23 cm + Combines all-encompassing topic coverage, authoritative information from seasoned experts, powerful instructor resources, and real-world student applications - delivering the comprehensive forensics resource Previous edition: 2010 New to this edition: updated coverage on Linux and Macintosh; updated coverage on virtual machine software, such as VMware and Virtual Box; updated coverage on Android, mobile devices, and handheld devices; enhanced end-of-chapter exercises Accompanying DVD-ROM (in back pocket) contains tutorials, project files and software tools Includes bibliographical references and index Understanding the digital forensics profession and investigations -- The investigator's office and laboratory -- Data acquisition -- Processing crime and incident scenes -- Working with Windows and CLI systems -- Current digital forensics tools -- Linux and Macintosh file systems -- Recovering graphics files -- Digital forensics analysis and validation -- Virtual machine forensics, live acquisitions, and network forensics -- E-mail and social media investigations -- Mobile device forensics -- Cloud forensics -- Report writing for high-tech investigations -- Expert testimony in digital investigations -- Ethics for the expert witness
更多信息……
英语 [en] · PDF · 46.7MB · 2016 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17481.488
lgli/D:\!genesis\library.nu\ed\_283112.ed31af07c3bcf8ffd7c323a4c015d7d0.pdf
The Investigator's Guide to Computer Crime Carl J., Ph.D. Franklin Charles C. Thomas Publisher, Limited, Charles C Thomas Publisher, Springfield, Ill, 2006
With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. Section I establishes standards for computer crime investigation, the computer crime investigation team, the computer system in criminal enterprise, the computer crime lab, expert assistance, and what the experts can do for your investigation. Section 2 deals with hardware and software crimes, theft of information, cyberstalking, identity theft, and exemplary federal cases. Section 3 focuses on the computer crime investigation, initial assessment and response, applying forensic science techniques, the basics of tracking the offender, and basic network systems. Section 4 deals with search, seizure, digital evidence, the Fourth Amendment principles and computer searches, general rules of consent, informants, undercover operatives, and the application of direct and circumstantial evidence. The appendices contain a wealth of information on identifying the computer components, understanding software, networks and communication systems, and a computer seizure checklist. This text will be a useful resource for law enforcement professionals, criminal justice students, security professionals, and private business.<BR/>
更多信息……
英语 [en] · PDF · 2.2MB · 2006 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17480.932
ia/cloudstoragefore0000quic.pdf
Cloud Storage Forensics Darren Quick; Ben Martini; Kim-Kwang Raymond Choo; Brett Shavers Elsevier Science & Technology Books; Elsevier; Syngress, Elsevier Ltd., Amsterdam, 2014
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner. Learn to use the methodology and tools from the first evidenced-based cloud forensic framework Case studies provide detailed tools for analysis of cloud storage devices using popular cloud storage services Includes coverage of the legal implications of cloud storage forensic investigations Discussion of the future evolution of cloud storage and its impact on digital forensics
更多信息……
英语 [en] · PDF · 13.4MB · 2014 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17480.736
ia/hackingexposedco0000phil.pdf
Hacking Exposed Computer Forensics, Second Edition : Computer Forensics Secrets & Solutions Aaron Philipp; David Cowen; Chris Davis McGraw-Hill/Osborne ; McGraw-Hill [distributor, McGraw Hill LLC Professional Division, New York, 2009
'Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies....Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations.'--Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny
更多信息……
英语 [en] · PDF · 30.5MB · 2009 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17480.42
ia/dissectinghackf00000stre.pdf
Dissecting the Hack : The F0rb1dd3n Network Street, Jayson E.; Nabors, Kent Elsevier Ltd, Elsevier Ltd., Burlington, MA, 2010
<p><i>Dissecting the Hack</i>&nbsp;is one heck of a ride! Hackers, IT professionals, and Infosec aficionados will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats.</p> <p>Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book!</p> <br> <br> <ul> <li>Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code</li> <li>Introduces basic hacking techniques in real life context for ease of learning</li> <li>Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack</li> </ul>
更多信息……
英语 [en] · PDF · 27.8MB · 2010 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17480.42
nexusstc/Mastering Windows Network Forensics and Investigation/67592c666c7136214a83097d713af9b2.pdf
Mastering Windows Network Forensics and Investigation, Second Edition Steven Anson; Steve Bunting; Ryan Johnson; Scott Pearson; Safari, an O’Reilly Media Company John Wiley & Sons, Inc.; Wiley-Interscience; Sybex, 2. Auflage, New York, 2012
**An authoritative guide to investigating high-technology crimes**Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. * Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network * Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response * Walks you through ways to present technically complicated material in simple terms that will hold up in court * Features content fully updated for Windows Server 2008 R2 and Windows 7 * Covers the emerging field of Windows Mobile forensics Also included is a classroom support package to ensure academic adoption, __Mastering Windows Network Forensics and Investigation, 2nd Edition__ offers help for investigating high-technology crimes.
更多信息……
英语 [en] · PDF · 42.1MB · 2012 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17480.42
upload/bibliotik/C/Computer Forensics For Dummies - Linda Volonino.epub
Computer Forensics For Dummies (For Dummies (Computer/Tech)) Linda Volonino and Reynaldo Anzaldua For Dummies, For Dummies Series, 1., 2008
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies ! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won&;t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You&;ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You&;ll discover how to use the latest forensic software, tools, and equipment to find the answers that you&;re looking for in record time. When you understand how data is stored, encrypted, and recovered, you&;ll be able to protect your personal privacy as well. By the time you finish reading this book, you&;ll know how to: Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents&; methods Handle passwords and encrypted data Work with the courts and win the case Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
更多信息……
英语 [en] · EPUB · 3.4MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17480.42
nexusstc/Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals/e562487ea1154e3466ed16c30a207d2c.rar
Cloud Forensics Demystified : Decoding Cloud Investigation Complexities for Digital Forensic Professionals Ganesh Ramakrishnan, Mansoor Haqanee Packt Publishing, Limited, 1, US, 2024
Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approaches Key Features: Uncover the steps involved in cloud forensic investigations for M365 and Google Workspace Explore tools and logs available within AWS, Azure, and Google for cloud investigations Learn how to investigate containerized services such as Kubernetes and Docker Purchase of the print or Kindle book includes a free PDF eBook Book Description: As organizations embrace cloud-centric environments, it becomes imperative for security professionals to master the skills of effective cloud investigation. Cloud Forensics Demystified addresses this pressing need, explaining how to use cloud-native tools and logs together with traditional digital forensic techniques for a thorough cloud investigation. The book begins by giving you an overview of cloud services, followed by a detailed exploration of the tools and techniques used to investigate popular cloud platforms such as Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP). Progressing through the chapters, you'll learn how to investigate Microsoft 365, Google Workspace, and containerized environments such as Kubernetes. Throughout, the chapters emphasize the significance of the cloud, explaining which tools and logs need to be enabled for investigative purposes and demonstrating how to integrate them with traditional digital forensic tools and techniques to respond to cloud security incidents. By the end of this book, you'll be well-equipped to handle security breaches in cloud-based environments and have a comprehensive understanding of the essential cloud-based logs vital to your investigations. This knowledge will enable you to swiftly acquire and scrutinize artifacts of interest in cloud security incidents. What You Will Learn: Explore the essential tools and logs for your cloud investigation Master the overall incident response process and approach Familiarize yourself with the MITRE ATT&CK framework for the cloud Get to grips with live forensic analysis and threat hunting in the cloud Learn about cloud evidence acquisition for offline analysis Analyze compromised Kubernetes containers Employ automated tools to collect logs from M365 Who this book is for: This book is for cybersecurity professionals, incident responders, and IT professionals adapting to the paradigm shift toward cloud-centric environments. Anyone seeking a comprehensive guide to investigating security incidents in popular cloud platforms such as AWS, Azure, and GCP, as well as Microsoft 365, Google Workspace, and containerized environments like Kubernetes will find this book useful. Whether you're a seasoned professional or a newcomer to cloud security, this book offers insights and practical knowledge to enable you to handle and secure cloud-based infrastructure.
更多信息……
英语 [en] · RAR · 64.9MB · 2024 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc · Save
base score: 11050.0, final score: 17480.297
ia/digitalforensics0000alth.pdf
Digital Forensics with Open Source Tools Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc Harlan Carvey; Cory Altheide Waltham, MA: Syngress, Elsevier Ltd., Burlington, MA, 2011
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations. This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies. Written by world-renowned forensic practitioners Details core concepts and techniques of forensic file system analysis Covers analysis of artifacts from the Windows, Mac, and Linux operating systems
更多信息……
英语 [en] · PDF · 15.2MB · 2011 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17479.951
zlib/Jurisprudence & Law/Criminology, Forensic Science/Altheide, Cory, Carvey, Harlan/Digital Forensics with Open Source Tools_27453883.pdf
Digital Forensics with Open Source Tools Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc Altheide, Cory, Carvey, Harlan Syngress Publishing, 1. Aufl, s.l, 2011
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations. This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies. Written by world-renowned forensic practitioners Details core concepts and techniques of forensic file system analysis Covers analysis of artifacts from the Windows, Mac, and Linux operating systems
更多信息……
英语 [en] · PDF · 4.6MB · 2011 · 📘 非小说类图书 · 🚀/zlib · Save
base score: 11068.0, final score: 17479.951
lgli/T:\lg_torr_restore_lg\312000/db6cba0347a20c5d38996a345cc87c61..pdf
Hacking Exposed Computer Forensics, Second Edition : Computer Forensics Secrets & Solutions Aaron Philipp, David Cowen, Chris Davis McGraw-Hill Osborne Media, 2nd ed, Emeryville, Calif., London, 2009], ©2010
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation **The latest strategies for investigating cyber-crime** Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. __Hacking Exposed Computer Forensics, Second Edition__ explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. * Effectively uncover, capture, and prepare evidence for investigation * Store and process collected data in a highly secure digital forensic lab * Restore deleted documents, partitions, user activities, and file systems * Analyze evidence gathered from Windows, Linux, and Macintosh systems * Use the latest Web and client-based e-mail tools to extract relevant artifacts * Overcome the hacker's anti-forensic, encryption, and obscurity techniques * Unlock clues stored in cell phones, PDAs, and Windows Mobile devices * Prepare legal documents that will hold up to judicial and defense scrutiny
更多信息……
英语 [en] · PDF · 10.6MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17479.951
nexusstc/Windows Registry Forensics/1f320f123451ffceb5e95edd17646023.epub
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry Harlan A. Carvey Syngress Publishing, 1, PS, 2011
Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER --Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Packed with real-world examples using freely available open source tools Deep explanation and understanding of the Windows Registry--the most difficult part of Windows to analyze forensically Includes a CD containing code and author-created tools discussed in the book
更多信息……
英语 [en] · EPUB · 2.1MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17479.643
upload/bibliotik/W/Windows Registry Forensics (2011) - Harlan Carvey.pdf
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry Harlan A. Carvey Syngress Publishing, 1, PS, 2011
Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER --Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Packed with real-world examples using freely available open source tools Deep explanation and understanding of the Windows Registry--the most difficult part of Windows to analyze forensically Includes a CD containing code and author-created tools discussed in the book
更多信息……
英语 [en] · PDF · 3.8MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17479.643
lgli/Shipley, Todd & Bowker, Art & Selby, Nick - Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace (2013, Elsevier Inc.).pdf
Investigating Internet Crimes : An Introduction to Solving Crimes in Cyberspace Shipley, Todd & Bowker, Art & Selby, Nick Elsevier Science & Technology Books, Rockland, MA, 2013
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace, (2014) 497pp. 978-0-12-407929-8
更多信息……
英语 [en] · PDF · 33.7MB · 2013 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17479.516
ia/handbookofdigita0000case.pdf
Handbook of Digital Forensics and Investigation by Eoghan Casey Academic; Elsevier Academic Press, Elsevier Ltd., Amsterdam, 2010
Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). This handbook is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind.•Provides methodologies proven in practice for conducting digital investigations of all kinds•Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations •Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms•Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations
更多信息……
英语 [en] · PDF · 43.6MB · 2010 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17479.516
nexusstc/Cloud Storage Forensics/67152ba4936eadc5fd5a8d421d6a8cdd.mobi
Cloud Storage Forensics Darren Quick; Ben Martini; Kim-Kwang Raymond Choo; Brett Shavers Elsevier Science & Technology Books; Elsevier; Syngress, 1, PT, 2013
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner. Learn to use the methodology and tools from the first evidenced-based cloud forensic framework Case studies provide detailed tools for analysis of cloud storage devices using popular cloud storage services Includes coverage of the legal implications of cloud storage forensic investigations Discussion of the future evolution of cloud storage and its impact on digital forensics
更多信息……
英语 [en] · MOBI · 8.1MB · 2013 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11055.0, final score: 17479.516
upload/emo37c/2024-10-21/content/Computer Forensics for Dummies/Computer Forensics for Dummies (ISBN - 0470371919).pdf
Computer Forensics For Dummies (For Dummies (Computer/Tech)) Linda Volonino and Reynaldo Anzaldua For Dummies, For Dummies Series, 1., 2008
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies ! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to: Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents’ methods Handle passwords and encrypted data Work with the courts and win the case Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
更多信息……
英语 [en] · PDF · 9.9MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17479.516
lgli/V:\!GST\DVD 20 - Great Science Textbooks DVD Library 2007 - Update Jul 2009\Computer Science\Brown - Computer Evidence - Collection and Preservation (Thomson, 2006).pdf
Computer Evidence - Collection and Preservation Christopher LT(Christopher L.T. Brown) Brown CHARLES RIVER MEDIA,INC, Networking Series, 1, 2005
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance! Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because these two phases of computer forensics are the most critical to evidence acceptance, but are not thoroughly covered in text or courses. Throughout the book, a constant eye is kept on evidence dynamics and the impact investigators can have on data integrity while collecting evidence. The simple act of a computer forensics investigator shutting down a suspect’s computer changes the state of the computer as well as many of its fi les, so a good understanding of evidence dynamics is essential when doing computer forensics work. Broken up into five parts, Computer Forensics & Evidence Dynamics, Information Systems, Data Storage Systems & Media, Artifact Collection, and Archiving & Maintaining Evidence, the book places specific focus on how investigators and their tools are interacting with digital evidence. By reading and using this task-oriented guide, computer forensics investigators will be able to ensure case integrity during the most crucial phases of the computer forensics process. KEY FEATURES \* Provides a practical fi eld guide to evidence collection and preservation that will help maintain evidence acceptability \* Covers key areas such as rules of evidence, evidence dynamics, network topologies, collecting volatile data, imaging methodologies, and forensics labs and workstations \* Teaches criminal investigators everything they need to know to ensure the integrity of their digital evidence \* Includes a CD-ROM with several demo and freeware software applications as well as document templates, worksheets, and references \* Includes a CD-ROM with several demo and freeware software applications as well as document templates, worksheets, and references On the CD! \* DRIVE HEALTH: Contains a demo version of this IDE disk-monitoring application \* CRYPTCAT: Contains this freeware application to create secure TCP/IP data channels \* MARESWARE: Provides demo utilities from Mares and Company LLC, which are useful for scripting large-batch forensic operations \* LANSURVEYOR: Contains a demo version of this software for mapping networks through various automatic discovery methods \* PRODISCOVER FORENSICS EDITION: Includes a demo version of this disk-imaging and analysis suite \* SYSINTERNALS: Contains three freeware utility applications (PSList, PSInfo, and PSLoggedon) useful in batch file volatitle data collection \* WINHEX: Provides a demo version of the WinHex raw fi le and disk editor \* FORMS: Includes digital copies of the sample forms provided in the book \* FIGURES: Includes all of the fi gures from the book by chapter SYSTEM REQUIREMENTS: Pentium class CPU or later; Windows 98SE / NT / 2000 / XP/2003; Web browser; 128MB of memory; 128MB of available disk space; CD-ROM or DVD-ROM drive; VGA monitor or high-resolution monitor; keyboard and mouse, or other pointing device.
更多信息……
英语 [en] · PDF · 5.3MB · 2005 · 📘 非小说类图书 · 🚀/duxiu/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17479.482
ia/unixforensicanal0000pogu.pdf
UNIX and Linux Forensic Analysis DVD Toolkit Chris Pogue; Cory Altheide; Todd Haverkos Rockland: Syngress Publishing, Elsevier Ltd., Burlington, Mass, 2008
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work. The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.
更多信息……
英语 [en] · PDF · 16.8MB · 2008 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17479.357
nexusstc/Windows Forensic Analysis DVD Toolkit/73a1a8042b299c1e861ef0b5e3132be9.pdf
Windows Forensic Analysis DVD Toolkit, Second Edition Harlan Carvey, Eoghan Casey, technical editor Syngress Publishing, 2nd ed., Burlington, MA, Massachusetts, 2009
Windows is the largest operating system on desktops and servers worldwide, which mean more intrusions and cybercrime happen on these systems. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants.
更多信息……
英语 [en] · PDF · 6.2MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17479.113
lgli/G:/!genesis/1/_missing/bf891211d07e4f84772069fe8c34d332.pdf
Cloud Storage Forensics Darren Quick; Ben Martini; Kim-Kwang Raymond Choo; Brett Shavers Elsevier Science & Technology Books; Elsevier; Syngress, 1, PT, 2013
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner. Learn to use the methodology and tools from the first evidenced-based cloud forensic framework Case studies provide detailed tools for analysis of cloud storage devices using popular cloud storage services Includes coverage of the legal implications of cloud storage forensic investigations Discussion of the future evolution of cloud storage and its impact on digital forensics
更多信息……
英语 [en] · PDF · 5.5MB · 2013 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17479.113
nexusstc/Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes/9a33f2b67791a8cf9d82e54b5a1b3266.pdf
Cyber Forensics : A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes Albert J. Marcella Jr.; Robert S. Greenfield Auerbach Publications, first edition, third impression, 2002
<p>Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a comprehensive, highly usable, and clearly organized resource to the issues, tools, and control techniques needed to successfully investigate illegal activities perpetuated through the use of information technology.</p> <p>Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. The field bible for infosecurity professionals, this book introduces you to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over your organization.</p> <p>You will understand how to:<br> </p> <ul class="noindent"> <li>Identify inappropriate uses of corporate IT<br> </li> <li>Examine computing environments to identify and gather electronic evidence of wrongdoing<br> </li> <li>Secure corporate systems from further misuse<br> </li> <li>Identify individuals responsible for engaging in inappropriate acts taken with or without corporate computing systems<br> </li> <li>Protect and secure electronic evidence from intentional or accidental modification or destruction</li> </ul> <p>Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a set of varied resources for anyone required to look under the hood and behind closed doors of a virtual world to gather evidence and to establish credible audit trails of electronic wrong doing. Knowing how to identify, gather, document, and preserve evidence of electronic tampering and misuse makes reading this book and using the forensic audit procedures it discusses essential to protecting corporate assets.</p>
更多信息……
英语 [en] · PDF · 3.5MB · 2002 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17479.102
nexusstc/Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7/42ea9ab9572e4f74b8140f1b89dfc6b1.epub
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7 Harlan Carvey, Eoghan Casey, technical editor Elsevier; Syngress, 3rd ed, Waltham, Mass, ©2012
Now in its third edition, Harlan Carvey has updated Windows Forensic Analysis Toolkit to cover Windows 7 systems. The primary focus of this edition is on analyzing Windows 7 systems and on processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. New to this edition, the companion and toolkit materials are now hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, 2nd Ed. (ISBN: 9781597494229), which focuses primarily on XP.Complete coverage and examples on Windows 7 systems Contains Lessons from the Field, Case Studies, and War Stories Companion online material, including electronic printable checklists, cheat sheets, free custom tools, and walk-through demos
更多信息……
英语 [en] · EPUB · 3.1MB · 2012 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17479.096
ia/sailingsafeincyb0000kaus.pdf
Sailing safe in cyberspace : protect your identity and data Kaushik, Anjali SAGE Publications India Pvt, Ltd.; SAGE Publications, New Delhi, 2013
Looking at safe computing, this text gives in-depth exposure to the various ways in which security of information on computers might be compromised, how cyber crime markets work and measures to ensure safety at individual and organizational levels.
更多信息……
英语 [en] · PDF · 15.0MB · 2013 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17479.0
ia/handbookofcomput0000unse_i2c0.pdf
Handbook of Computer Crime Investigation : Forensic Tools and Technology Eoghan Casey San Diego, Calif.: Academic Press, Elsevier Ltd., San Diego, Calif, 2002
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical'how to'information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations. The Tools section provides details of leading hardware and software The main Technology section provides the technical'how to'information for collecting and analysing digital evidence in common situations Case Examples give readers a sense of the technical, legal, and practical challenges that arise in real computer investigations
更多信息……
英语 [en] · PDF · 24.7MB · 2002 · 📗 未知类型的图书 · 🚀/duxiu/ia · Save
base score: 11068.0, final score: 17478.96
lgli/Unknown - UNIX and Linux Forensic Analysis DVD Toolkit (2008, ).pdf
UNIX and Linux Forensic Analysis DVD Toolkit Unknown Syngress Publishing, Elsevier Ltd., Burlington, Mass, 2008
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work. The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.
更多信息……
英语 [en] · PDF · 5.1MB · 2008 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17478.96
nexusstc/Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes/428dc25fee9261bb8defdadfddee412b.pdf
Cyber Forensics : A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes Albert J. Marcella Jr.; Robert S. Greenfield Auerbach Publications, first edition, third impression, 2002
<p>Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a comprehensive, highly usable, and clearly organized resource to the issues, tools, and control techniques needed to successfully investigate illegal activities perpetuated through the use of information technology.</p> <p>Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. The field bible for infosecurity professionals, this book introduces you to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over your organization.</p> <p>You will understand how to:<br> </p> <ul class="noindent"> <li>Identify inappropriate uses of corporate IT<br> </li> <li>Examine computing environments to identify and gather electronic evidence of wrongdoing<br> </li> <li>Secure corporate systems from further misuse<br> </li> <li>Identify individuals responsible for engaging in inappropriate acts taken with or without corporate computing systems<br> </li> <li>Protect and secure electronic evidence from intentional or accidental modification or destruction</li> </ul> <p>Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a set of varied resources for anyone required to look under the hood and behind closed doors of a virtual world to gather evidence and to establish credible audit trails of electronic wrong doing. Knowing how to identify, gather, document, and preserve evidence of electronic tampering and misuse makes reading this book and using the forensic audit procedures it discusses essential to protecting corporate assets.</p>
更多信息……
英语 [en] · PDF · 3.9MB · 2002 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17478.95
lgli/G:\!genesis\1\_missing\5055f818b0373e8da942df86171d58c1.pdf
Computer incident response and forensics team management : conducting a successful incident response Leighton Johnson; Mike Kessler Elsevier, Syngress, Computer Incident Response and Forensics Team Management, 1, 2014
__Computer Incident Response and Forensics Team Management__ provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components. * Provides readers with a complete handbook on computer incident response from the perspective of forensics team management * Identify the key steps to completing a successful computer incident response investigation * Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams
更多信息……
英语 [en] · PDF · 44.9MB · 2014 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17478.25
nexusstc/Handbook of Computer Crime Investigation: Forensic Tools and Technology/ebeb4e79df3b864b54f269f3aa6bf3d9.pdf
Handbook of Computer Crime Investigation : Forensic Tools and Technology Eoghan Casey Academic Press, Incorporated, 1st edition, October 15, 2001
Following on the success of his introductory text, Digital Evidence and Computer Crime , Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations. The Tools section provides details of leading hardware and software ·
更多信息……
英语 [en] · PDF · 9.7MB · 2001 · 📘 非小说类图书 · 🚀/duxiu/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17478.25
nexusstc/Learn Computer Forensics - Your One-Stop Guide to Searching, Analyzing, Acquiring, and Securing Digital Evidence/3ab037d0d5f92969f2e5dd794c224c63.pdf
Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition William Oettinger Packt Publishing, Limited; Packt Publishing, 2nd ed., 2022
Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.
更多信息……
英语 [en] · PDF · 6.8MB · 2022 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17477.791
zlib/Computers/Security/Vinny Troia/Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques_119462550.pdf
Hunting Cyber Criminals : A Hacker's Guide to Online Intelligence Gathering Tools and Techniques Vinny Troia Wiley & Sons, Incorporated, John; Wiley, John Wiley & Sons, Inc. (trade), Indianapolis, Indiana, 2020
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerni ‎ B083VZTL52ng a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries.
更多信息……
英语 [en] · PDF · 11.2MB · 2020 · 📘 非小说类图书 · 🚀/zlib · Save
base score: 11068.0, final score: 17477.658
ia/computerevidence0000dahl.pdf
Computer Evidence (Forensic Crime Solvers) Michael Dahl; Barbara Rollins Edge Books [Imprint] Capstone Press, Incorporated Capstone Publishers [distributor, Science Reference Center, Bloomington, Bloomington, July 2004
Annotation Describes different types of computer crimes, including hackers sending viruses and worms, and how police investigators investigate and use computer evidence to track down suspects and solve cases
更多信息……
英语 [en] · PDF · 1.9MB · 2004 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17477.658
ia/hightechnologycr0000rose.pdf
High-Technology Crime: Investigating Cases Involving Computers (with 3.5 diskette) Rosenblatt, Kenneth S, Rosenblatt, Kenneth S., Rosenblatt, Kenneth San Jose, Calif.: KSK Publications, San Jose, Calif, California, 1995
xxiv, 603 pages ; 23 cm + This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers. The book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers; for example, the crime of breaking and entering into computers flourished after businesses began connecting computers to sophisticated telecommunications networks. High-technology crime also includes traditional crimes so transformed by computer technology that investigators handling such cases must be familiar with computers and the high-technology industry. One chapter discusses basic principles common to investigating high- technology crime, and three chapters examine the most common high-technology crimes: theft of components, computer intrusion, and theft of information. These three chapters provide readers, including those with no technical background or competence, with the necessary technical information to investigate those crimes, along with a procedure for doing so. An appendix contains a checklist for these investigations. The second part of the book examines a growing challenge facing every law enforcement agency in the United States: safely and legally obtaining evidence stored within computers. Obtaining evidence from a computer without damaging equipment or losing data is just one part of the problem; there are also substantial legal hurdles to searching and seizing computer evidence. Few courts have applied the Fourth Amendment to searches for computer evidence, which means that the law in this area remains unclear. Three chapters discuss the legal obstacles to searching and seizing computer evidence and suggest how readers can draft search warrants to surmount those obstacles. A diskette contains investigative checklists and sample search warrant language. Appended introduction to computer technology and an article on how to protect trade secrets from disclosure during a criminal prosecution, along with a sample protective order to be used for that purpose Includes bibliographical references (pages 579-580) and index Using this book -- Acknowledgments -- 1. Introduction -- 2. Principles of high-technology crime investigation -- 3. Investigating theft of components -- 4. Investigating computer intrusion -- 5. Investigating theft of information -- 6. Searching, seizing, and analyzing computer evidence -- 7. Computers and the Fourth Amendment -- 8. Federal privacy laws -- 9. Drafting search warrants in cases involving computers -- Appendix A. Checklists -- Appendix B. Search warrants (on disk) -- Appendix C. Protecting trade secrets during criminal prosecutions -- Appendix D. Tutorial -- Bibliography -- Table of Cases -- Index
更多信息……
英语 [en] · PDF · 20.6MB · 1995 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17477.658
ia/computersciencei0000roon.pdf
Computer Science and IT: Investigating a Cyber Attack (Anatomy of an Investigation) Rooney, Anne Chicago, Ill.: Capstone Heinemann Library, Anatomy of an investigation, Anatomy of an investigation, Chicago, Ill, Illinois, 2014
56 pages : 25 cm Describes the science and technology concepts used by cyber attack investigators, including information on hackers, identity theft, firewalls, computer forensics, and data recovery Includes bibliographical references and index Attack! -- Keeping information safe -- Confirming the attack -- Assessing the damage -- Forensic computing -- A secure future -- Investigation : how to be anonymous -- Timeline of a computer hack Describes the science and technology concepts used by cyber attack investigators, including information on hackers, identity theft, firewalls, computer forensics, and data recovery
更多信息……
英语 [en] · PDF · 16.1MB · 2014 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17477.658
upload/newsarch_ebooks/2023/07/30/3031365739.pdf
Digital Forensics and Cyber Crime : 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings Sanjay Goel (editor), Pavel Gladyshev (editor), Akatyev Nikolay (editor), George Markowsky (editor), Daryl Johnson (editor) Springer International Publishing, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST); 508, 2023
This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022. The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
更多信息……
英语 [en] · PDF · 43.9MB · 2023 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17477.658
nexusstc/Digital Forensics, Investigation, and Response/c77b9a68ae205c1441c15f316308f558.pdf
Digital Forensics, Investigation, and Response Chuck Easttom Jones & Bartlett Learning, LLC, 4, PS, 2021
Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources. Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device.
更多信息……
英语 [en] · PDF · 35.6MB · 2021 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17477.658
lgli/s:\NZB\usenet_complete7\b_2021-07-04 - b6566dac000e7d7a3a201f0dfa8bbf8f - Nonfiction.Ebook.PDF.JUL21-PHC/9780128007433.Elsevier.Cyber_Crime_and_Cyber_Terrorism_Investigator's_Handbook.Babak_Akhgar.Jul.2014.pdf
Cyber Crime and Cyber Terrorism Investigator's Handbook Babak Akhgar (editor), Andrew Staniforth (editor), Francesca Bosco (editor) Syngress, 1, US, 2014
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime. Written by experts in cyber crime, digital investigations, and counter-terrorism Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators Keep up to date on current national and international law regarding cyber crime and cyber terrorism See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world
更多信息……
英语 [en] · PDF · 2.4MB · 2014 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17477.629
lgli/U:\!dutch\!\M\Middleton, Bruce\Bruce Middleton - Cyber Crime Investigators Field Guide (en).pdf
CYBER CRIME INVESTIGATOR'S FIELD GUIDE Middleton, Bruce AUERBACH PUBLICATIONS, CRC Press (Unlimited), Boca Raton, FL, 2002
Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace.Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. You get easy access to information such as:Questions to ask the clientSteps to follow when you arrive at the client's siteProcedures for collecting evidenceDetails on how to use various evidence collection and analysis toolsHow to recover lost passwords or documents that are password protectedCommonly asked questions with appropriate answersRecommended reference materialsA case study to see the computer forensic tools in actionCommonly used UNIX/Linux commandsPort number references for various services and applicationsComputer forensic software tools commands synopsisAttack signaturesCisco PIX firewall commandsWe now have software and hardware to protect our data communication systems. We have laws that provide law enforcement more teeth to take a bite out of cyber crime. Now we need to combine understanding investigative techniques and technical knowledge of cyberspace. That's what this book does. Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime...tools that tell you the who, where, what, when, why, and how.
更多信息……
英语 [en] · PDF · 2.4MB · 2002 · 📘 非小说类图书 · 🚀/duxiu/lgli/lgrs/zlib · Save
base score: 11065.0, final score: 17477.629
lgli/Investigating Cryptocurrencies.pdf
Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence Nick Furneaux; William J Knottenbelt John Wiley & Sons, Incorporated, 1, 2018-06-13
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. • Understand blockchain and transaction technologies • Set up and run cryptocurrency accounts • Build information about specific addresses • Access raw data on blockchain ledgers • Identify users of cryptocurrencies • Extracting cryptocurrency data from live and imaged computers • Following the money With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.
更多信息……
英语 [en] · PDF · 18.7MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs/zlib · Save
base score: 11065.0, final score: 17477.629
lgli/Den Tätern auf der Spur - Spannende Fälle aus der IT-Sicherheit und IT-Forensik.pdf
Den Tätern auf der Spur : Spannende Fälle aus IT-Sicherheit und IT-Forensik Alexander Dörsam Springer Spektrum. in Springer Fachmedien Wiesbaden GmbH, Springer Nature, Wiesbaden, Germany, 2017
Aus dem Alltag eines digitalen Ersthelfers  Der IT-Sicherheitsexperte Alexander Dörsam entführt Sie mit seinem Buch in die spannende Welt von Hacking, Unternehmenserpressung, Spionage und digitalem Vandalismus. Anhand von realen IT-Sicherheitsvorfällen erfahren Sie, wie Angreifer in Firmenstrukturen eindringen, welche Methoden dafür eingesetzt werden und welche Folgen das haben kann. Doch wie schütze ich mich oder mein Unternehmen? Was ist zu tun bei einem digitalen Notfall? Dörsam hilft Ihnen nicht selbst Opfer zu werden, zeigt das IT-Krisenmanagement und gibt Hinweise zur Ersthilfe bei IT-Sicherheitsvorfällen.  Ein fesselndes Buch für alle, die mehr über aktuelle digitale Bedrohungen erfahren wollen.
更多信息……
德语 [de] · PDF · 1.5MB · 2017 · 📘 非小说类图书 · 🚀/lgli/lgrs · Save
base score: 11060.0, final score: 17477.234
upload/motw_shc_2025_10/shc/Cyber Crime and Cyber Terrorism Investigat - Babak Akhgar.pdf
Cyber crime and cyber terrorism investigator's handbook Babak Akhgar, Andrew Staniforth, Francesca Bosco, (eds.) Syngress, , Elsevier Inc, 1, US, 2014
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime. Written by experts in cyber crime, digital investigations, and counter-terrorism Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators Keep up to date on current national and international law regarding cyber crime and cyber terrorism See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world **
更多信息……
英语 [en] · PDF · 6.0MB · 2014 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17477.207
ia/cybercop0000hyne.pdf
Cyber Cop (21st Century Skills Library: Cool Science Careers) by Patricia Freeland Hynes Gareth Stevens Publishing, 21st century skills library, Ann Arbor, MI, ©2008
Law enforcement is keeping up with technology - and the criminals attempting to take advantage of it. Cyber cops use the latest electronic devices to track and find the bad guys.
更多信息……
英语 [en] · PDF · 2.2MB · 2008 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17477.107
lgli/Bruce Nikkel - Practical Linux Forensics (2021, No Starch Press).pdf
Practical Linux Forensics : A Guide for Digital Investigators Bruce Nikkel No Starch Press, Incorporated, 2021
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You'll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.Learn how to:Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryptionInvestigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applicationsReconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical loginPerform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashesExamine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distrosPerform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux systemReconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifactsAnalyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settingsIdentify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity
更多信息……
英语 [en] · PDF · 8.7MB · 2021 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17477.107
上一页 1 2 下一页
上一页 1 2 下一页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗