Over 10 mio. titler Fri fragt ved køb over 499,- Hurtig levering Forlænget returret til 31/01/25

The Basics of Digital Forensics

- The Primer for Getting Started in Digital Forensics

Bog
  • Format
  • Bog, paperback
  • Engelsk

Beskrivelse

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides the reader with real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. This valuable resource also covers how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness.

Læs hele beskrivelsen
Detaljer
  • SprogEngelsk
  • Sidetal200
  • Udgivelsesdato15-12-2014
  • ISBN139780128016350
  • Forlag Syngress Media,u.S.
  • FormatPaperback
Størrelse og vægt
  • Vægt410 g
  • coffee cup img
    10 cm
    book img
    19,1 cm
    23,5 cm

    Findes i disse kategorier...

    Se andre, der handler om...

    Metadata Encryption GSM Quality assurance Triangulation Certification Accreditation Cookies Social engineering Packet switching Cloud computing Gnutella Dictionary attack Password cracking Local Area Network Nonvolatile Memory Symmetric encryption Firewall Binary Distributed Denial of Service E-Discovery Chain-of-custody LAN QA File system Algorithm Spoofing TDMA Global Positioning System (GPS) Sca Public Cloud Garbage collection Steganography Search and seizure Faraday Sniffer Registry Asymmetric encryption Intrusion Detection System DDoS Standard operating procedure IDS Hash function Forensics Man-in-the-middle attack Spoliation Electronic Discovery American Society of Crime Laboratory Directors/Laboratory Accreditation Board American Academy of Forensic Sciences Allocated Space ASCLD/LAB Brute force attack Call Detail Records Cloud Service Provider (CSP) Cipher Text CSI Effect Daubert v. Merrell Dow Pharmaceuticals Dead System Deleted Data Document and Media Exploitation (DOMEX) Client/server network Encrypting File System Examiners Final Report INDEX.DAT Hiberfile.sys Internet Relay Chat (IRC) Duty to Preserve Live System File Signature File Header NTUSER.DAT New Technology File System Order of Volatility Personal Unlock Key (PUK) probable cause Personal Identification Number (PIN) RCFL Print Spooling Remote Computing Service (RCS) Post Office Protocol (POP) Short Message Service (SMS) Scientific Working Group on Digital Evidence (SWGDE) Regional Computer Forensic Laboratory Restore Points (RPs) Subscriber Identity Module (SIM) standards and controls Simple Mail Transfer Protocol (SMTP) Solid State Drive Unallocated Space Most Recently Used (MRU) Plain Text Shadow Copies Recycle Bin Stored Communication Act Temporary Internet Files (TIF) Solid State Drive (SSD) Thumbnail Cache
    Machine Name: SAXO081