語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Fundamentals of digital forensics = ...
~
Kavrestad, Joakim.
FindBook
Google Book
Amazon
博客來
Fundamentals of digital forensics = theory, methods, and real-life applications /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Fundamentals of digital forensics/ by Joakim Kavrestad.
其他題名:
theory, methods, and real-life applications /
作者:
Kavrestad, Joakim.
出版者:
Cham :Springer International Publishing : : 2020.,
面頁冊數:
xiii, 268 p. :ill., digital ;24 cm.
內容註:
Part I: Theory -- What Is Digital Forensics? -- Ethics and Integrity -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Part II: The Forensic Process -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Incident Response -- Collecting Evidence -- Triage -- Analyzing Data and Writing Reports -- Part III: Get Practical -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions and Tasks -- FTK Specifics -- Open-Source or Freeware Tools -- Part IV: Memory Forensics -- Memory Analysis -- Memory Analysis Tools -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report (Template) -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log.
Contained By:
Springer eBooks
標題:
Digital forensic science. -
電子資源:
https://doi.org/10.1007/978-3-030-38954-3
ISBN:
9783030389543
Fundamentals of digital forensics = theory, methods, and real-life applications /
Kavrestad, Joakim.
Fundamentals of digital forensics
theory, methods, and real-life applications /[electronic resource] :by Joakim Kavrestad. - Second edition. - Cham :Springer International Publishing :2020. - xiii, 268 p. :ill., digital ;24 cm.
Part I: Theory -- What Is Digital Forensics? -- Ethics and Integrity -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Part II: The Forensic Process -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Incident Response -- Collecting Evidence -- Triage -- Analyzing Data and Writing Reports -- Part III: Get Practical -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions and Tasks -- FTK Specifics -- Open-Source or Freeware Tools -- Part IV: Memory Forensics -- Memory Analysis -- Memory Analysis Tools -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report (Template) -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log.
This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises. This enhanced second edition has been expanded with new material on incident response tasks and computer memory analysis. Topics and features: Outlines what computer forensics is, and what it can do, as well as what its limitations are Discusses both the theoretical foundations and the fundamentals of forensic methodology Reviews broad principles that are applicable worldwide Explains how to find and interpret several important artifacts Describes free and open source software tools, along with the AccessData Forensic Toolkit Features exercises and review questions throughout, with solutions provided in the appendices Includes numerous practical examples, and provides supporting video lectures online This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations. Joakim Kavrestad is a lecturer and researcher at the University of Skovde, Sweden, and an AccessData Certified Examiner. He also serves as a forensic consultant, with several years of experience as a forensic expert with the Swedish police.
ISBN: 9783030389543
Standard No.: 10.1007/978-3-030-38954-3doiSubjects--Topical Terms:
3338165
Digital forensic science.
LC Class. No.: HV8079.C65 / K865 2020
Dewey Class. No.: 005.8
Fundamentals of digital forensics = theory, methods, and real-life applications /
LDR
:03543nmm a2200349 a 4500
001
2254980
003
DE-He213
005
20200519120034.0
006
m d
007
cr nn 008maaau
008
220419s2020 gw s 0 eng d
020
$a
9783030389543
$q
(electronic bk.)
020
$a
9783030389536
$q
(paper)
024
7
$a
10.1007/978-3-030-38954-3
$2
doi
035
$a
978-3-030-38954-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV8079.C65
$b
K865 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
HV8079.C65
$b
K21 2020
100
1
$a
Kavrestad, Joakim.
$3
3258612
245
1 0
$a
Fundamentals of digital forensics
$h
[electronic resource] :
$b
theory, methods, and real-life applications /
$c
by Joakim Kavrestad.
250
$a
Second edition.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xiii, 268 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I: Theory -- What Is Digital Forensics? -- Ethics and Integrity -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Part II: The Forensic Process -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Incident Response -- Collecting Evidence -- Triage -- Analyzing Data and Writing Reports -- Part III: Get Practical -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions and Tasks -- FTK Specifics -- Open-Source or Freeware Tools -- Part IV: Memory Forensics -- Memory Analysis -- Memory Analysis Tools -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report (Template) -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log.
520
$a
This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises. This enhanced second edition has been expanded with new material on incident response tasks and computer memory analysis. Topics and features: Outlines what computer forensics is, and what it can do, as well as what its limitations are Discusses both the theoretical foundations and the fundamentals of forensic methodology Reviews broad principles that are applicable worldwide Explains how to find and interpret several important artifacts Describes free and open source software tools, along with the AccessData Forensic Toolkit Features exercises and review questions throughout, with solutions provided in the appendices Includes numerous practical examples, and provides supporting video lectures online This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations. Joakim Kavrestad is a lecturer and researcher at the University of Skovde, Sweden, and an AccessData Certified Examiner. He also serves as a forensic consultant, with several years of experience as a forensic expert with the Swedish police.
650
0
$a
Digital forensic science.
$3
3338165
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Image Processing and Computer Vision.
$3
891070
650
2 4
$a
Crime Control and Security.
$3
3251653
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-030-38954-3
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9410619
電子資源
11.線上閱覽_V
電子書
EB HV8079.C65 K865 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入