Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Forensics Basics: A Practical Guide Using Windows OS

Buy

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law.

Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use.

Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills.

What You’ll Learn

  • Assemble computer forensics lab requirements, including workstations, tools, and more
  • Document the digital crime scene, including preparing a sample chain of custody form
  • Differentiate between law enforcement agency and corporate investigations
  • Gather intelligence using OSINT sources
  • Acquire and analyze digital evidence
  • Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensics
  • Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques

Who This Book Is For

Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals

(HTML tags aren't allowed.)

Google Script: Enterprise Application Essentials: Adding Functionality to Your Google Apps
Google Script: Enterprise Application Essentials: Adding Functionality to Your Google Apps

If you are reading this book, there is a good chance you have heard of Google and its powerful office productivity suite, Google Apps. Google offers search, email, word processing, and hundreds of other cloud applications and services that can be available to the individual and can scale all the way up to massive corporations and...

Built to Sell: Turn Your Business Into One You Can Sell
Built to Sell: Turn Your Business Into One You Can Sell
When you start a business, it’s natural to dream of selling it one day. In fact, more than half of America’s 27 million business owners now say they want to sell their business in the next 10 years. You may want to retire, travel, cash out, or just sleep well at night knowing you could sell your...
Fundamentals of Wireless Communication
Fundamentals of Wireless Communication
Wireless communication is one of the most vibrant areas in the communication
field today. While it has been a topic of study since the 1960s,
the past decade has seen a surge of research activities in the area. This is
due to a confluence of several factors. First, there has been an explosive
increase in demand for tetherless
...

Systems Analysis and Design (Shelly Cashman Series)
Systems Analysis and Design (Shelly Cashman Series)

Discover a practical, streamlined, updated approach to information systems development that covers both traditional and emerging technologies and approaches to systems analysis and design. SYSTEMS ANALYSIS AND DESIGN, 11E offers a well-organized, streamlined approach. Chapter objectives are keyed directly to chapter headings, making content...

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
3D Computer Graphics: A Mathematical Introduction with OpenGL
3D Computer Graphics: A Mathematical Introduction with OpenGL
This book is an introduction to 3-D computer graphics with particular emphasis
on fundamentals and the mathematics underlying computer graphics. It includes
descriptions of how to use the cross-platformOpenGL programming environment.
It also includes source code for a ray tracing software package. (Accompanying
software is
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy