Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Buy

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.

You’ll learn how to:
–Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
–Protect attached evidence media from accidental modification
–Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
–Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
–Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
–Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
–Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media

With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

(HTML tags aren't allowed.)

The Success of Open Source
The Success of Open Source

Much of the innovative programming that powers the Internet, creates operating systems, and produces software is the result of "open source" code, that is, code that is freely distributed--as opposed to being kept secret--by those who write it. Leaving source code open has generated some of the most sophisticated developments in...

Aligned for Success: Reset Your Body from the Ground Up
Aligned for Success: Reset Your Body from the Ground Up
How to reach your fitness goals, prevent pain and injury, and achieve optimal performance in work, sports, and life.

Pain is a byproduct of our busy, active lives, but it doesn’t have to be a constant and hindering presence. Whether your daily activity consists of caring for children, or training for marathons, Dr.
...
Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...


Integrating Employee Health: A Model Program for NASA
Integrating Employee Health: A Model Program for NASA
The American workforce is changing, creating new challenges for employers to provide occupational health services to meet the needs of employees. First, a shift from manufacturing to services, knowledgecentered, and mobile work has changed the focus of occupational health from physical injury and exposure-related illness...
Linux Networking Cookbook
Linux Networking Cookbook
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean...
Exploring the JDS Linux Desktop
Exploring the JDS Linux Desktop
The ideal guide to JDS, Exploring the JDS Linux Desktop is clear and direct, and carefully covers such housekeeping chores as setting up networking, updates, and backups. It enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy