000 05170nam a22005655i 4500
001 978-3-319-96319-8
003 DE-He213
005 20210201191309.0
007 cr nn 008mamaa
008 180731s2018 gw | s |||| 0|eng d
020 _a9783319963198
_9978-3-319-96319-8
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aKävrestad, Joakim.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aFundamentals of Digital Forensics
_h[electronic resource] :
_bTheory, Methods, and Real-Life Applications /
_cby Joakim Kävrestad.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXII, 230 p. 124 illus., 6 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
500 _aAcceso multiusuario
505 0 _aPart I: Theory -- What is Digital Forensics? -- Cybercrime, Cyber-Aided Crime and Digital Evidence -- Computer Theory -- Notable Artifacts -- Decryption and Password Enforcing -- Collecting Evidence -- Analyzing Data and Writing Reports -- Part II: Put It to Practice -- Collecting Data -- Indexing and Searching -- Cracking -- Finding Artifacts -- Some Common Questions -- FTK Specifics -- Open Source or Freeware Tools -- Part III: Memory Forensics -- Memory Management -- Volatility -- Memory Analysis in Criminal Investigations -- Malware Analysis -- Part IV: Appendices -- Appendix A - Solutions -- Appendix B - Useful Scripts -- Appendix C - Sample Report (Template) -- Appendix D - List of Time Zones -- Appendix E - complete Jitsi Chat Log.
520 _aThis hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can't. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries. Topics and features: Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes Offers a practical overview of common practices for cracking encrypted data Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them Presents a survey of various different search techniques, and several forensic tools that are available for free Examines the functions of AccessData Forensic Toolkit and Registry Viewer Proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled Describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility Provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector. Joakim Kävrestad is a Lecturer in informatics at the University of Skövde, Sweden, with several years of experience as a forensic expert with the Swedish police.
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aComputer security.
650 0 _aOptical data processing.
650 0 _aData encryption (Computer science).
650 0 _aPublic safety.
650 1 4 _aSystems and Data Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28060
650 2 4 _aImage Processing and Computer Vision.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I22021
650 2 4 _aCryptology.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28020
650 2 4 _aCrime Control and Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/1BE000
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319963181
776 0 8 _iPrinted edition:
_z9783319963204
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-96319-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c241845
_d241844