Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Fundamentals of digital forensics = ...
~
Kavrestad, Joakim.
Linked to FindBook
Google Book
Amazon
博客來
Fundamentals of digital forensics = theory, methods, and real-life applications /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Fundamentals of digital forensics/ by Joakim Kavrestad.
Reminder of title:
theory, methods, and real-life applications /
Author:
Kavrestad, Joakim.
Published:
Cham :Springer International Publishing : : 2020.,
Description:
xiii, 268 p. :ill., digital ;24 cm.
[NT 15003449]:
Part I: Theory -- What Is Digital Forensics? -- Ethics and Integrity -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Part II: The Forensic Process -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Incident Response -- Collecting Evidence -- Triage -- Analyzing Data and Writing Reports -- Part III: Get Practical -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions and Tasks -- FTK Specifics -- Open-Source or Freeware Tools -- Part IV: Memory Forensics -- Memory Analysis -- Memory Analysis Tools -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report (Template) -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log.
Contained By:
Springer eBooks
Subject:
Digital forensic science. -
Online resource:
https://doi.org/10.1007/978-3-030-38954-3
ISBN:
9783030389543
Fundamentals of digital forensics = theory, methods, and real-life applications /
Kavrestad, Joakim.
Fundamentals of digital forensics
theory, methods, and real-life applications /[electronic resource] :by Joakim Kavrestad. - Second edition. - Cham :Springer International Publishing :2020. - xiii, 268 p. :ill., digital ;24 cm.
Part I: Theory -- What Is Digital Forensics? -- Ethics and Integrity -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Part II: The Forensic Process -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Incident Response -- Collecting Evidence -- Triage -- Analyzing Data and Writing Reports -- Part III: Get Practical -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions and Tasks -- FTK Specifics -- Open-Source or Freeware Tools -- Part IV: Memory Forensics -- Memory Analysis -- Memory Analysis Tools -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report (Template) -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log.
This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises. This enhanced second edition has been expanded with new material on incident response tasks and computer memory analysis. Topics and features: Outlines what computer forensics is, and what it can do, as well as what its limitations are Discusses both the theoretical foundations and the fundamentals of forensic methodology Reviews broad principles that are applicable worldwide Explains how to find and interpret several important artifacts Describes free and open source software tools, along with the AccessData Forensic Toolkit Features exercises and review questions throughout, with solutions provided in the appendices Includes numerous practical examples, and provides supporting video lectures online This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations. Joakim Kavrestad is a lecturer and researcher at the University of Skovde, Sweden, and an AccessData Certified Examiner. He also serves as a forensic consultant, with several years of experience as a forensic expert with the Swedish police.
ISBN: 9783030389543
Standard No.: 10.1007/978-3-030-38954-3doiSubjects--Topical Terms:
3338165
Digital forensic science.
LC Class. No.: HV8079.C65 / K865 2020
Dewey Class. No.: 005.8
Fundamentals of digital forensics = theory, methods, and real-life applications /
LDR
:03543nmm a2200349 a 4500
001
2254980
003
DE-He213
005
20200519120034.0
006
m d
007
cr nn 008maaau
008
220419s2020 gw s 0 eng d
020
$a
9783030389543
$q
(electronic bk.)
020
$a
9783030389536
$q
(paper)
024
7
$a
10.1007/978-3-030-38954-3
$2
doi
035
$a
978-3-030-38954-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV8079.C65
$b
K865 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
HV8079.C65
$b
K21 2020
100
1
$a
Kavrestad, Joakim.
$3
3258612
245
1 0
$a
Fundamentals of digital forensics
$h
[electronic resource] :
$b
theory, methods, and real-life applications /
$c
by Joakim Kavrestad.
250
$a
Second edition.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xiii, 268 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I: Theory -- What Is Digital Forensics? -- Ethics and Integrity -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Part II: The Forensic Process -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Incident Response -- Collecting Evidence -- Triage -- Analyzing Data and Writing Reports -- Part III: Get Practical -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions and Tasks -- FTK Specifics -- Open-Source or Freeware Tools -- Part IV: Memory Forensics -- Memory Analysis -- Memory Analysis Tools -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report (Template) -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log.
520
$a
This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises. This enhanced second edition has been expanded with new material on incident response tasks and computer memory analysis. Topics and features: Outlines what computer forensics is, and what it can do, as well as what its limitations are Discusses both the theoretical foundations and the fundamentals of forensic methodology Reviews broad principles that are applicable worldwide Explains how to find and interpret several important artifacts Describes free and open source software tools, along with the AccessData Forensic Toolkit Features exercises and review questions throughout, with solutions provided in the appendices Includes numerous practical examples, and provides supporting video lectures online This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations. Joakim Kavrestad is a lecturer and researcher at the University of Skovde, Sweden, and an AccessData Certified Examiner. He also serves as a forensic consultant, with several years of experience as a forensic expert with the Swedish police.
650
0
$a
Digital forensic science.
$3
3338165
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Image Processing and Computer Vision.
$3
891070
650
2 4
$a
Crime Control and Security.
$3
3251653
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-030-38954-3
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9410619
電子資源
11.線上閱覽_V
電子書
EB HV8079.C65 K865 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login