Fundamentals of Digital Forensics

Theory, Methods, and Real-Life Applications

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Fundamentals of Digital Forensics by Joakim Kävrestad, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Joakim Kävrestad ISBN: 9783319963198
Publisher: Springer International Publishing Publication: July 31, 2018
Imprint: Springer Language: English
Author: Joakim Kävrestad
ISBN: 9783319963198
Publisher: Springer International Publishing
Publication: July 31, 2018
Imprint: Springer
Language: English

This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can’t. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries.

Topics and features: introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment; discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes; offers a practical overview of common practices for cracking encrypted data; reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them; presents a survey of various different search techniques, and several forensic tools that are available for free; examines the functions of AccessData Forensic Toolkit and Registry Viewer; proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled; describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility; provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube.

This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can’t. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries.

Topics and features: introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment; discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes; offers a practical overview of common practices for cracking encrypted data; reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them; presents a survey of various different search techniques, and several forensic tools that are available for free; examines the functions of AccessData Forensic Toolkit and Registry Viewer; proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled; describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility; provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube.

This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector.

More books from Springer International Publishing

Cover of the book ICGG 2018 - Proceedings of the 18th International Conference on Geometry and Graphics by Joakim Kävrestad
Cover of the book Intelligent Interactive Multimedia Systems and Services 2016 by Joakim Kävrestad
Cover of the book Next Generation Antibody Drug Conjugates (ADCs) and Immunotoxins by Joakim Kävrestad
Cover of the book Behaviour of Lithium-Ion Batteries in Electric Vehicles by Joakim Kävrestad
Cover of the book Functional Ophthalmic Disorders by Joakim Kävrestad
Cover of the book President Trump and General Pershing by Joakim Kävrestad
Cover of the book Machiavelli, Islam and the East by Joakim Kävrestad
Cover of the book Neural Information Processing by Joakim Kävrestad
Cover of the book Energy and the Wealth of Nations by Joakim Kävrestad
Cover of the book Interprétations phénoménologiques de la 'Physique' d’Aristote chez Heidegger et Patočka by Joakim Kävrestad
Cover of the book Intelligent Robotics and Applications by Joakim Kävrestad
Cover of the book Image Analysis and Recognition by Joakim Kävrestad
Cover of the book Elective Language Study and Policy in Israel by Joakim Kävrestad
Cover of the book Models for Cooperative Games with Fuzzy Relations among the Agents by Joakim Kävrestad
Cover of the book Women of Words in Le Morte Darthur by Joakim Kävrestad
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy