Cyber Forensics Up and Running
ISBN: 978-93-555-1718-0
Format: 19.1x23.5cm
Liczba stron: 414
Oprawa: Miękka
Wydanie: 2023 r.
Język: angielski
Dostępność: dostępny
<p><strong style="color: rgba(34, 34, 34, 1)">Empowering you to investigate, analyze, and secure the digital realm</strong></p><p><br></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Digital forensics is the art and science of extracting the hidden truth and this book is your hands-on companion, bringing the world of digital forensics to life. </span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)"> </span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Starting with the core principles of digital forensics, the book explores the significance of various case types, the interconnectedness of the field with cybersecurity, and the ever-expanding digital world's challenges. As you progress, you will explore data acquisition, image formats, digital evidence preservation, file carving, metadata extraction, and the practical use of essential forensic tools like HxD, The Sleuth Kit, Autopsy, Volatility, and PowerForensics. The book offers step-by-step instructions, real-world case studies, and practical examples, ensuring that beginners can confidently set up and use forensic tools. Experienced professionals, on the other hand, will find advanced insights into memory analysis, network forensics, anti-forensic techniques, and more.</span></p><p><br></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">This book empowers you to become a digital detective, capable of uncovering data secrets, investigating networks, exploring volatile and non-volatile evidence, and understanding the intricacies of modern browsers and emails.</span></p><p><br></p><p><strong style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">WHAT YOU WILL LEARN</strong></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Learn how to set up and use digital forensic tools, including virtual environments. </span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Learn about live forensics, incident response, and timeline examination.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">In-depth exploration of Windows Registry and USBs.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Network forensics, PCAPs, and malware scenarios.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Memory forensics, malware detection, and file carving.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Advance tools like PowerForensics and Autopsy.</span></p><p><br></p><p><strong style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">WHO THIS BOOK IS FOR</strong></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Whether you are a tech-savvy detective, a curious student, or a seasoned cybersecurity pro seeking to amplify your skillset. Network admins, law enforcement officers, incident responders, aspiring analysts, and even legal professionals will find invaluable tools and techniques within these pages.</span></p><p><br></p><p><br></p><p><br></p><p><br></p>