Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1416
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kevrestad, Joakim. ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:37Z | - |
dc.date.available | 2020-05-17T08:28:37Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319674506 ; | en_US |
dc.identifier.isbn | 3319674501 ; | en_US |
dc.identifier.isbn | 9783319674490 ; | en_US |
dc.identifier.isbn | 3319674498 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1416 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319674490 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This work introduces the reader to the world of digital forensics in a practical and accessible manner. The text was written to fulfill a need for a book that introduces forensic methodology and sound forensic thinking, combined with hands-on examples for common tasks in a computer forensic examination. The author has several years of experience as a computer forensics examiner and is now working as a university-level lecturer. Guide to Digital Forensics: A Concise and Practical Introduction is intended for students that are looking for an introduction to computer forensics and can also be used as a collection of instructions for practitioners. The aim is to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a fo rensic examination in law enforcement and in the private sector. Upon reading this book, the reader should have a proper overview of the field of digital forensics, starting them on the journey of becoming a computer forensics expert ; | en_US |
dc.description.statementofresponsibility | by Joakim Kevrestad | en_US |
dc.description.tableofcontents | Part I: Theory -- What is Digital Forensicse -- What is Cybercrimee -- Computer Theory -- Collecting Evidence -- Analyzing Data and Writing Reports.-ePart II: Putting it into Practice.-eCollecting Data -- Indexing, Searching and Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Basic Memory Analysis.-ePart III: Vocabulary -- Vocabulary -- Part IV: Appendices -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report Template -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.format.extent | Includes bibliographical references ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768 ; | en_US |
dc.relation.ispartofseries | SpringerBriefs in computer science, ; 2191-5768 ; | en_US |
dc.relation.haspart | 9783319674506.pdf | en_US |
dc.subject | Computer science ; | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Image processing ; | en_US |
dc.title | Guide to Digital Forensics | en_US |
dc.title.alternative | A Concise and Practical Introduction / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319674506.pdf | 5.26 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kevrestad, Joakim. ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:37Z | - |
dc.date.available | 2020-05-17T08:28:37Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319674506 ; | en_US |
dc.identifier.isbn | 3319674501 ; | en_US |
dc.identifier.isbn | 9783319674490 ; | en_US |
dc.identifier.isbn | 3319674498 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1416 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319674490 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This work introduces the reader to the world of digital forensics in a practical and accessible manner. The text was written to fulfill a need for a book that introduces forensic methodology and sound forensic thinking, combined with hands-on examples for common tasks in a computer forensic examination. The author has several years of experience as a computer forensics examiner and is now working as a university-level lecturer. Guide to Digital Forensics: A Concise and Practical Introduction is intended for students that are looking for an introduction to computer forensics and can also be used as a collection of instructions for practitioners. The aim is to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a fo rensic examination in law enforcement and in the private sector. Upon reading this book, the reader should have a proper overview of the field of digital forensics, starting them on the journey of becoming a computer forensics expert ; | en_US |
dc.description.statementofresponsibility | by Joakim Kevrestad | en_US |
dc.description.tableofcontents | Part I: Theory -- What is Digital Forensicse -- What is Cybercrimee -- Computer Theory -- Collecting Evidence -- Analyzing Data and Writing Reports.-ePart II: Putting it into Practice.-eCollecting Data -- Indexing, Searching and Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Basic Memory Analysis.-ePart III: Vocabulary -- Vocabulary -- Part IV: Appendices -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report Template -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.format.extent | Includes bibliographical references ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768 ; | en_US |
dc.relation.ispartofseries | SpringerBriefs in computer science, ; 2191-5768 ; | en_US |
dc.relation.haspart | 9783319674506.pdf | en_US |
dc.subject | Computer science ; | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Image processing ; | en_US |
dc.title | Guide to Digital Forensics | en_US |
dc.title.alternative | A Concise and Practical Introduction / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319674506.pdf | 5.26 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kevrestad, Joakim. ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:37Z | - |
dc.date.available | 2020-05-17T08:28:37Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319674506 ; | en_US |
dc.identifier.isbn | 3319674501 ; | en_US |
dc.identifier.isbn | 9783319674490 ; | en_US |
dc.identifier.isbn | 3319674498 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1416 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319674490 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This work introduces the reader to the world of digital forensics in a practical and accessible manner. The text was written to fulfill a need for a book that introduces forensic methodology and sound forensic thinking, combined with hands-on examples for common tasks in a computer forensic examination. The author has several years of experience as a computer forensics examiner and is now working as a university-level lecturer. Guide to Digital Forensics: A Concise and Practical Introduction is intended for students that are looking for an introduction to computer forensics and can also be used as a collection of instructions for practitioners. The aim is to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a fo rensic examination in law enforcement and in the private sector. Upon reading this book, the reader should have a proper overview of the field of digital forensics, starting them on the journey of becoming a computer forensics expert ; | en_US |
dc.description.statementofresponsibility | by Joakim Kevrestad | en_US |
dc.description.tableofcontents | Part I: Theory -- What is Digital Forensicse -- What is Cybercrimee -- Computer Theory -- Collecting Evidence -- Analyzing Data and Writing Reports.-ePart II: Putting it into Practice.-eCollecting Data -- Indexing, Searching and Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Basic Memory Analysis.-ePart III: Vocabulary -- Vocabulary -- Part IV: Appendices -- Appendix A: Solutions -- Appendix B: Useful Scripts -- Appendix C: Sample Report Template -- Appendix D: List of Time Zones -- Appendix E: Complete Jitsi Chat Log ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.format.extent | Includes bibliographical references ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768 ; | en_US |
dc.relation.ispartofseries | SpringerBriefs in computer science, ; 2191-5768 ; | en_US |
dc.relation.haspart | 9783319674506.pdf | en_US |
dc.subject | Computer science ; | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Image processing ; | en_US |
dc.title | Guide to Digital Forensics | en_US |
dc.title.alternative | A Concise and Practical Introduction / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319674506.pdf | 5.26 MB | Adobe PDF | Preview File |