Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/807
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKevrestad, Joakim. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:17Z-
dc.date.available2020-05-17T08:22:17Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319963198 ;en_US
dc.identifier.isbn9783319963181 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/807-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319963181. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it caneet. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries. Topics and features: Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes Offers a practical overview of common practices for cracking encrypted data Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them Presents a survey of various different search techniques, and several forensic tools that are available for free Examines the functions of AccessData Forensic Toolkit and Registry Viewer Proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled Describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility Provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector. Joakim Kevrestad is a Lecturer in informatics at the University of Skevde, Sweden, with several years of experience as a forensic expert with the Swedish police. ;en_US
dc.description.statementofresponsibilityby Joakim Kevrestad.en_US
dc.description.tableofcontentsPart I: Theory -- What is Digital Forensicse -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Collecting Evidence -- Analyzing Data and Writing Reports -- Part II: Put It to Practice -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Open Source or Freeware Tools -- Part III: Memory Forensics -- Memory Management -- Volatility -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Part IV: Appendices -- Appendix A ee Solutions -- Appendix B ee Useful Scripts -- Appendix C ee Sample Report (Template) -- Appendix D ee List of Time Zones -- Appendix E ee complete Jitsi Chat Log. ;en_US
dc.format.extentXII, 230 p. 124 illus., 6 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319963181.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectImage processing. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectImage Processing and Computer Vision. ;en_US
dc.subjectData Encryption. ;en_US
dc.subjectCrime Control and Security. ;en_US
dc.titleFundamentals of Digital Forensicsen_US
dc.title.alternativeTheory, Methods, and Real-Life Applications /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319963181.pdf7.97 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKevrestad, Joakim. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:17Z-
dc.date.available2020-05-17T08:22:17Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319963198 ;en_US
dc.identifier.isbn9783319963181 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/807-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319963181. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it caneet. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries. Topics and features: Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes Offers a practical overview of common practices for cracking encrypted data Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them Presents a survey of various different search techniques, and several forensic tools that are available for free Examines the functions of AccessData Forensic Toolkit and Registry Viewer Proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled Describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility Provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector. Joakim Kevrestad is a Lecturer in informatics at the University of Skevde, Sweden, with several years of experience as a forensic expert with the Swedish police. ;en_US
dc.description.statementofresponsibilityby Joakim Kevrestad.en_US
dc.description.tableofcontentsPart I: Theory -- What is Digital Forensicse -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Collecting Evidence -- Analyzing Data and Writing Reports -- Part II: Put It to Practice -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Open Source or Freeware Tools -- Part III: Memory Forensics -- Memory Management -- Volatility -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Part IV: Appendices -- Appendix A ee Solutions -- Appendix B ee Useful Scripts -- Appendix C ee Sample Report (Template) -- Appendix D ee List of Time Zones -- Appendix E ee complete Jitsi Chat Log. ;en_US
dc.format.extentXII, 230 p. 124 illus., 6 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319963181.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectImage processing. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectImage Processing and Computer Vision. ;en_US
dc.subjectData Encryption. ;en_US
dc.subjectCrime Control and Security. ;en_US
dc.titleFundamentals of Digital Forensicsen_US
dc.title.alternativeTheory, Methods, and Real-Life Applications /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319963181.pdf7.97 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKevrestad, Joakim. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:17Z-
dc.date.available2020-05-17T08:22:17Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319963198 ;en_US
dc.identifier.isbn9783319963181 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/807-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319963181. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it caneet. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries. Topics and features: Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes Offers a practical overview of common practices for cracking encrypted data Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them Presents a survey of various different search techniques, and several forensic tools that are available for free Examines the functions of AccessData Forensic Toolkit and Registry Viewer Proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled Describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility Provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector. Joakim Kevrestad is a Lecturer in informatics at the University of Skevde, Sweden, with several years of experience as a forensic expert with the Swedish police. ;en_US
dc.description.statementofresponsibilityby Joakim Kevrestad.en_US
dc.description.tableofcontentsPart I: Theory -- What is Digital Forensicse -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Collecting Evidence -- Analyzing Data and Writing Reports -- Part II: Put It to Practice -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Open Source or Freeware Tools -- Part III: Memory Forensics -- Memory Management -- Volatility -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Part IV: Appendices -- Appendix A ee Solutions -- Appendix B ee Useful Scripts -- Appendix C ee Sample Report (Template) -- Appendix D ee List of Time Zones -- Appendix E ee complete Jitsi Chat Log. ;en_US
dc.format.extentXII, 230 p. 124 illus., 6 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319963181.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectImage processing. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectImage Processing and Computer Vision. ;en_US
dc.subjectData Encryption. ;en_US
dc.subjectCrime Control and Security. ;en_US
dc.titleFundamentals of Digital Forensicsen_US
dc.title.alternativeTheory, Methods, and Real-Life Applications /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319963181.pdf7.97 MBAdobe PDFThumbnail
Preview File