Introductory computer forensics : a hands-on practical approach / Xiaodong Lin.
Material type: TextPublisher: Cham : Springer, 2018Description: 1 online resource (xxiii, 577 pages) : illustrations (some color)Content type: text Media type: computer Carrier type: online resourceISBN: 9783030005818; 303000581XSubject(s): Computer science | Digital forensic science | Computer crimes -- Investigation | Medical -- Forensic Medicine | Social Science -- Criminology | Computers -- Security -- General | Computers -- Interactive & Multimedia | Forensic science | Crime & criminology | Computer security | Graphical & digital media applications | Data protection | Forensic medicine | Computer crimes | Computer security | Multimedia systemsDDC classification: 364.16/8 LOC classification: HV8079.C65Online access: Click to view 2 copies
Contents:
1 Introduction to Computer Forensics.- 2 Introduction to Computer Organization.- 3 Building a Forensics Workstation.- 4 Volume Analysis.- 5 Examining FAT File System.- 6 Deleted File Recovery in FAT.- 7 Examining NTFS File System.- 8 Deleted File Recovery in NTFS.- 9 File Carving.- 10 File Signature Searching Forensics.- 11 Keyword Forensics.- 12 Timeline Analysis.- 13 Data Hiding and Detection.- 14 Log Analysis.- 15 Android Forensics.- 16 GPS Forensics.- 17 SIM Cards Forensics.- 18 Introductory Malware Analysis.- 19 Ransomware Analysis.- 20 Image Forgery Detection.- 21 Steganography and Steganalysis.
Item type | Current library | Home library | Class number | Status | Date due | Barcode | Item reservations | |
---|---|---|---|---|---|---|---|---|
E-book | Electronic publication | Electronic publication | Available | |||||
E-book | Electronic publication | Electronic publication | Available |
Total reservations: 0
1 Introduction to Computer Forensics.- 2 Introduction to Computer Organization.- 3 Building a Forensics Workstation.- 4 Volume Analysis.- 5 Examining FAT File System.- 6 Deleted File Recovery in FAT.- 7 Examining NTFS File System.- 8 Deleted File Recovery in NTFS.- 9 File Carving.- 10 File Signature Searching Forensics.- 11 Keyword Forensics.- 12 Timeline Analysis.- 13 Data Hiding and Detection.- 14 Log Analysis.- 15 Android Forensics.- 16 GPS Forensics.- 17 SIM Cards Forensics.- 18 Introductory Malware Analysis.- 19 Ransomware Analysis.- 20 Image Forgery Detection.- 21 Steganography and Steganalysis.
Online resource; title from PDF title page (SpringerLink, viewed November 27, 2018).
There are no comments on this title.
Log in to your account to post a comment.