Buch, Englisch, 268 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 435 g
Theory, Methods, and Real-Life Applications
Buch, Englisch, 268 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 435 g
ISBN: 978-3-030-38953-6
Verlag: Springer International Publishing
This enhanced second edition has been expanded with new material on incident response tasks and computer memory analysis.
Topics and features:
- Outlines what computer forensics is, and what it can do, as well as what its limitations are
- Discusses both the theoretical foundations and the fundamentals of forensic methodology
- Reviews broad principles that are applicable worldwide
- Explains how to findand interpret several important artifacts
- Describes free and open source software tools, along with the AccessData Forensic Toolkit
- Features exercises and review questions throughout, with solutions provided in the appendices
- Includes numerous practical examples, and provides supporting video lectures online
This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations.
Joakim Kävrestad is a lecturer and researcher at the University of Skövde, Sweden, and an AccessData Certified Examiner. He also serves as a forensic consultant, with several years of experience as a forensic expert with the Swedish police.
Zielgruppe
Upper undergraduate
Autoren/Hrsg.
Fachgebiete
- Rechtswissenschaften Strafrecht Kriminologie, Strafverfolgung
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Computer Vision
- Mathematik | Informatik EDV | Informatik Informatik Bildsignalverarbeitung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
Weitere Infos & Material
Part I: Theory.- What Is Digital Forensics?.- Ethics and Integrity.- Computer Theory.- Notable Artifacts.- Decryption and Password Enforcing.- Part II: The Forensic Process.- Cybercrime, Cyber-Aided Crime and Digital Evidence.- Incident Response.- Collecting Evidence.- Triage.- Analyzing Data and Writing Reports.- Part III: Get Practical.- Collecting Data.- Indexing and Searching.- Cracking.- Finding Artifacts.- Some Common Questions and Tasks.- FTK Specifics.- Open-Source or Freeware Tools.- Part IV: Memory Forensics.- Memory Analysis.- Memory Analysis Tools.- Memory Analysis in Criminal Investigations.- Malware Analysis.- Appendix A: Solutions.- Appendix B: Useful Scripts.- Appendix C: Sample Report (Template).- Appendix D: List of Time Zones.- Appendix E: Complete Jitsi Chat Log.