|
|
|
|
|
|
Windows Forensic Analysis DVD Toolkit, Second Edition"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer
"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior... | | Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan
This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the International Workshop on Computational Forensics (IWCF 2010), held in Tokyo, Japan during November 11–12, 2010. The workshop took place in conjunction with the 16th Annual Scientific Meeting of the Japanese Association of Forensic Science. ... | | Alternate Data Storage ForensicsDigital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital... |
|
Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic... | | Perl Scripting for IT SecurityThis book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely... | | Privacy Protection and Computer Forensics, Second EditionThis book deals with security from hostile computer forensics (mostly on one’s computer, but also on one’s digital camera, fax machine, and related computer-like electronics), as distinct from network forensics, which in this context is snooping into users’ online activities. Computer forensics deals with... |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 |