語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Fundamentals of digital forensics = ...
~
Kavrestad, Joakim.
FindBook
Google Book
Amazon
博客來
Fundamentals of digital forensics = theory, methods, and real-life applications /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Fundamentals of digital forensics/ by Joakim Kavrestad.
其他題名:
theory, methods, and real-life applications /
作者:
Kavrestad, Joakim.
出版者:
Cham :Springer International Publishing : : 2018.,
面頁冊數:
xii, 230 p. :ill., digital ;24 cm.
內容註:
Part I: Theory -- What is Digital Forensics? -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Collecting Evidence -- Analyzing Data and Writing Reports -- Part II: Put It to Practice -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Open Source or Freeware Tools -- Part III: Memory Forensics -- Memory Management -- Volatility -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Part IV: Appendices -- Appendix A - Solutions -- Appendix B - Useful Scripts -- Appendix C - Sample Report (Template) -- Appendix D - List of Time Zones -- Appendix E - complete Jitsi Chat Log.
Contained By:
Springer eBooks
標題:
Digital forensic science. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-96319-8
ISBN:
9783319963198
Fundamentals of digital forensics = theory, methods, and real-life applications /
Kavrestad, Joakim.
Fundamentals of digital forensics
theory, methods, and real-life applications /[electronic resource] :by Joakim Kavrestad. - Cham :Springer International Publishing :2018. - xii, 230 p. :ill., digital ;24 cm.
Part I: Theory -- What is Digital Forensics? -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Collecting Evidence -- Analyzing Data and Writing Reports -- Part II: Put It to Practice -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Open Source or Freeware Tools -- Part III: Memory Forensics -- Memory Management -- Volatility -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Part IV: Appendices -- Appendix A - Solutions -- Appendix B - Useful Scripts -- Appendix C - Sample Report (Template) -- Appendix D - List of Time Zones -- Appendix E - complete Jitsi Chat Log.
This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can't. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries. Topics and features: Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes Offers a practical overview of common practices for cracking encrypted data Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them Presents a survey of various different search techniques, and several forensic tools that are available for free Examines the functions of AccessData Forensic Toolkit and Registry Viewer Proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled Describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility Provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector. Joakim Kavrestad is a Lecturer in informatics at the University of Skovde, Sweden, with several years of experience as a forensic expert with the Swedish police.
ISBN: 9783319963198
Standard No.: 10.1007/978-3-319-96319-8doiSubjects--Topical Terms:
3338165
Digital forensic science.
LC Class. No.: HV8079.C65
Dewey Class. No.: 363.25968
Fundamentals of digital forensics = theory, methods, and real-life applications /
LDR
:03826nmm a2200325 a 4500
001
2152151
003
DE-He213
005
20180731153011.0
006
m d
007
cr nn 008maaau
008
190403s2018 gw s 0 eng d
020
$a
9783319963198
$q
(electronic bk.)
020
$a
9783319963181
$q
(paper)
024
7
$a
10.1007/978-3-319-96319-8
$2
doi
035
$a
978-3-319-96319-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV8079.C65
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
363.25968
$2
23
090
$a
HV8079.C65
$b
K21 2018
100
1
$a
Kavrestad, Joakim.
$3
3258612
245
1 0
$a
Fundamentals of digital forensics
$h
[electronic resource] :
$b
theory, methods, and real-life applications /
$c
by Joakim Kavrestad.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
xii, 230 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I: Theory -- What is Digital Forensics? -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Collecting Evidence -- Analyzing Data and Writing Reports -- Part II: Put It to Practice -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Open Source or Freeware Tools -- Part III: Memory Forensics -- Memory Management -- Volatility -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Part IV: Appendices -- Appendix A - Solutions -- Appendix B - Useful Scripts -- Appendix C - Sample Report (Template) -- Appendix D - List of Time Zones -- Appendix E - complete Jitsi Chat Log.
520
$a
This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can't. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries. Topics and features: Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes Offers a practical overview of common practices for cracking encrypted data Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them Presents a survey of various different search techniques, and several forensic tools that are available for free Examines the functions of AccessData Forensic Toolkit and Registry Viewer Proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled Describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility Provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector. Joakim Kavrestad is a Lecturer in informatics at the University of Skovde, Sweden, with several years of experience as a forensic expert with the Swedish police.
650
0
$a
Digital forensic science.
$3
3338165
650
0
$a
Computer crimes
$x
Investigation.
$3
622656
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Image Processing and Computer Vision.
$3
891070
650
2 4
$a
Data Encryption.
$3
891254
650
2 4
$a
Crime Control and Security.
$3
3251653
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-96319-8
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9352283
電子資源
11.線上閱覽_V
電子書
EB HV8079.C65
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入