یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references.
یادداشتهای مربوط به مندرجات
متن يادداشت
Introduction : Understanding digital forensics -- Essential technical concepts -- Computer forensics lab requirements -- Initial response and first responder tasks -- Acquiring digital evidence -- Analyzing digital evidence -- Windows forensics analysis -- Web browser and E-mail forensics -- Antiforensics techniques -- Gathering evidence from OSINT sources -- Digital forensics report.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You'll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
OverDrive, Inc.
منبع سفارش / آدرس اشتراک
Safari Books Online
شماره انبار
7247B602-7FB4-47BF-A0D8-0AAB7E3FB37B
شماره انبار
CL0501000038
ویراست دیگر از اثر در قالب دیگر رسانه
شماره استاندارد بين المللي کتاب و موسيقي
1484238370
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer crimes-- Investigation.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Digital forensic science.
موضوع مستند نشده
Computer crimes-- Investigation.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Digital forensic science.
مقوله موضوعی
موضوع مستند نشده
COM053000
موضوع مستند نشده
UR
موضوع مستند نشده
UR
رده بندی ديویی
شماره
363
.
25968
ويراست
23
رده بندی کنگره
شماره رده
HV8079
.
C65
نشانه اثر
.
H377
2019
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )