|
|
|
|
LEADER |
04216nam a2200517 4500 |
001 |
978-3-030-00581-8 |
003 |
DE-He213 |
005 |
20191220130100.0 |
007 |
cr nn 008mamaa |
008 |
181110s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030005818
|9 978-3-030-00581-8
|
024 |
7 |
|
|a 10.1007/978-3-030-00581-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Lin, Xiaodong.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Introductory Computer Forensics
|h [electronic resource] :
|b A Hands-on Practical Approach /
|c by Xiaodong Lin.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XXIII, 577 p. 459 illus., 347 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a 1 Introduction to Computer Forensics -- 2 Introduction to Computer Organization -- 3 Building a Forensics Workstation -- 4 Volume Analysis -- 5 Examining FAT File System -- 6 Deleted File Recovery in FAT -- 7 Examining NTFS File System -- 8 Deleted File Recovery in NTFS -- 9 File Carving -- 10 File Signature Searching Forensics -- 11 Keyword Forensics -- 12 Timeline Analysis -- 13 Data Hiding and Detection -- 14 Log Analysis -- 15 Android Forensics -- 16 GPS Forensics -- 17 SIM Cards Forensics -- 18 Introductory Malware Analysis -- 19 Ransomware Analysis -- 20 Image Forgery Detection -- 21 Steganography and Steganalysis.
|
520 |
|
|
|a This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students' understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Forensic science.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Multimedia information systems.
|
650 |
1 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Forensic Science.
|0 http://scigraph.springernature.com/things/product-market-codes/B23000
|
650 |
2 |
4 |
|a Cybercrime.
|0 http://scigraph.springernature.com/things/product-market-codes/1B7000
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Multimedia Information Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I18059
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030005801
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030005825
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-00581-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|