語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Digital Forensics Basics = A Practic...
~
SpringerLink (Online service)
Digital Forensics Basics = A Practical Guide Using Windows OS /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Digital Forensics Basics/ by Nihad A. Hassan.
其他題名:
A Practical Guide Using Windows OS /
作者:
Hassan, Nihad A.
面頁冊數:
XXII, 335 p. 155 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-1-4842-3838-7
ISBN:
9781484238387
Digital Forensics Basics = A Practical Guide Using Windows OS /
Hassan, Nihad A.
Digital Forensics Basics
A Practical Guide Using Windows OS /[electronic resource] :by Nihad A. Hassan. - 1st ed. 2019. - XXII, 335 p. 155 illus.online resource.
Chapter 1: Introduction: Understanding Digital Forensics -- Chapter 2: Essential Technical Concepts -- Chapter 3: Computer Forensics Lab Requirements -- Chapter 4: Initial Response and First Responder Tasks -- Chapter 5: Acquiring Digital Evidence -- Chapter 6: Analyzing Digital Evidence -- Chapter 7: Windows Forensics Analysis -- Chapter 8: Web Browser and Email Forensics -- Chapter 9: Antiforensics Techniques -- Chapter 10: Open Source Intelligence (OSINT) -- Chapter 11: Digital Forensics Report.
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You’ll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques.
ISBN: 9781484238387
Standard No.: 10.1007/978-1-4842-3838-7doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Digital Forensics Basics = A Practical Guide Using Windows OS /
LDR
:03542nam a22003975i 4500
001
1009333
003
DE-He213
005
20201110133016.0
007
cr nn 008mamaa
008
210106s2019 xxu| s |||| 0|eng d
020
$a
9781484238387
$9
978-1-4842-3838-7
024
7
$a
10.1007/978-1-4842-3838-7
$2
doi
035
$a
978-1-4842-3838-7
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Hassan, Nihad A.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1199390
245
1 0
$a
Digital Forensics Basics
$h
[electronic resource] :
$b
A Practical Guide Using Windows OS /
$c
by Nihad A. Hassan.
250
$a
1st ed. 2019.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
XXII, 335 p. 155 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: Introduction: Understanding Digital Forensics -- Chapter 2: Essential Technical Concepts -- Chapter 3: Computer Forensics Lab Requirements -- Chapter 4: Initial Response and First Responder Tasks -- Chapter 5: Acquiring Digital Evidence -- Chapter 6: Analyzing Digital Evidence -- Chapter 7: Windows Forensics Analysis -- Chapter 8: Web Browser and Email Forensics -- Chapter 9: Antiforensics Techniques -- Chapter 10: Open Source Intelligence (OSINT) -- Chapter 11: Digital Forensics Report.
520
$a
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You’ll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques.
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Security.
$3
1114130
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484238370
776
0 8
$i
Printed edition:
$z
9781484238394
776
0 8
$i
Printed edition:
$z
9781484267332
856
4 0
$u
https://doi.org/10.1007/978-1-4842-3838-7
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入