Image from Google Jackets

Introductory computer forensics : a hands-on practical approach / Xiaodong Lin.

By: Lin, Xiaodong (Computer scientist) [author.]Material type: TextTextPublisher: Cham : Springer, 2018Description: 1 online resource (xxiii, 577 pages) : illustrations (some color)Content type: text Media type: computer Carrier type: online resourceISBN: 9783030005818; 303000581XSubject(s): Computer science | Digital forensic science | Computer crimes -- Investigation | Medical -- Forensic Medicine | Social Science -- Criminology | Computers -- Security -- General | Computers -- Interactive & Multimedia | Forensic science | Crime & criminology | Computer security | Graphical & digital media applications | Data protection | Forensic medicine | Computer crimes | Computer security | Multimedia systemsDDC classification: 364.16/8 LOC classification: HV8079.C65Online access: Click to view 2 copies
Contents:
1 Introduction to Computer Forensics.- 2 Introduction to Computer Organization.- 3 Building a Forensics Workstation.- 4 Volume Analysis.- 5 Examining FAT File System.- 6 Deleted File Recovery in FAT.- 7 Examining NTFS File System.- 8 Deleted File Recovery in NTFS.- 9 File Carving.- 10 File Signature Searching Forensics.- 11 Keyword Forensics.- 12 Timeline Analysis.- 13 Data Hiding and Detection.- 14 Log Analysis.- 15 Android Forensics.- 16 GPS Forensics.- 17 SIM Cards Forensics.- 18 Introductory Malware Analysis.- 19 Ransomware Analysis.- 20 Image Forgery Detection.- 21 Steganography and Steganalysis.
Holdings
Item type Current library Home library Class number Status Date due Barcode Item reservations
E-book E-book Electronic publication Electronic publication Available
E-book E-book Electronic publication Electronic publication Available
Total reservations: 0

1 Introduction to Computer Forensics.- 2 Introduction to Computer Organization.- 3 Building a Forensics Workstation.- 4 Volume Analysis.- 5 Examining FAT File System.- 6 Deleted File Recovery in FAT.- 7 Examining NTFS File System.- 8 Deleted File Recovery in NTFS.- 9 File Carving.- 10 File Signature Searching Forensics.- 11 Keyword Forensics.- 12 Timeline Analysis.- 13 Data Hiding and Detection.- 14 Log Analysis.- 15 Android Forensics.- 16 GPS Forensics.- 17 SIM Cards Forensics.- 18 Introductory Malware Analysis.- 19 Ransomware Analysis.- 20 Image Forgery Detection.- 21 Steganography and Steganalysis.

Online resource; title from PDF title page (SpringerLink, viewed November 27, 2018).

There are no comments on this title.

to post a comment.