Digital forensics explained / Edited by Greg Gogolin
Material type:

Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
LRC - Annex | National University - Manila | Computer Science | General Circulation | GC HV 8079.C65 .D54 2021 (Browse shelf (Opens below)) | c.1 | Available | NULIB000019539 |
Browsing National University - Manila shelves, Shelving location: General Circulation, Collection: Computer Science Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC HF 5548 .B73 2008 Problem-solving cases in Microsoft Access and Excel / | GC HN 730 .E443 2016 Electoral survey methodology : insight from Japan on using computer assisted personal interviews / | GC HV 8079.C65 .C37 2012 Windows forensic analysis toolkit : advanced analysis techniques for Windows 7 / | GC HV 8079.C65 .D54 2021 Digital forensics explained / | GC JF 799 .E443 2016 Electronic participation : 8th IFIP WG 8.5 International Conference, EPART 2016, Guimares, Portugal, September 5-8, 2016 proceedings / | GC JN 97.A56 .E63 2013 E- participation in Southern Europe and the Balkans : issues of democracy and participation via electronic media / | GC P 306.5 .H68 2009 Translation / |
Includes index.
1. What is digital forensics, and what should you know about it? -- 2. Digital forensic approaches and best practices -- 3. Digital forensics tool kit -- 4. Internet and e-mail examinations -- 5. Mobile forensics -- 6. Cloud computing and digital forensics -- 7. Law enforcement incident response -- 8. Report writing and presentation -- 9. Social media forensics -- 10. Social engineering forensics -- 11. Anti-forensics -- 12. Link and visual analysis -- 13. Psychological, ethical, and cultural implications of digital forensics -- 14. Someone is watching -- 15. The realities of digital forensic practice.
Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations.
There are no comments on this title.