Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Buy

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.

You’ll learn how to:
–Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
–Protect attached evidence media from accidental modification
–Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
–Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
–Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
–Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
–Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media

With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

(HTML tags aren't allowed.)

Sams Teach Yourself iPad in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself iPad in 10 Minutes (Sams Teach Yourself -- Minutes)

Sams Teach Yourself iPad™ in 10 Minutes offers straightforward, practical answers when you need fast results. By working through 10-minute lessons, you’ll learn everything you need to use your iPad to get online, get apps, use the Web, manage email, use maps, books, photos, music,...

Fluid Dynamics and Transport of Droplets and Sprays
Fluid Dynamics and Transport of Droplets and Sprays

This book serves as both a graduate text and a reference for engineers and scientists exploring the theoretical and computational aspects of the fluid dynamics and transport of sprays and droplets. Attention is given to the behavior of individual droplets, including the effects of forced convection due to relative droplet-gas motion, Stefan...

Database Design and Relational Theory: Normal Forms and All That Jazz
Database Design and Relational Theory: Normal Forms and All That Jazz
This book began life as a comparatively short chapter in a book called Database in Depth: Relational Theory for Practitioners (O’Reilly, 2005). That book was superseded by SQL and Relational Theory: How to Write Accurate SQL Code (O’Reilly, 2009), where the design material, since it was somewhat tangential to...

Office 2013 All-In-One For Dummies
Office 2013 All-In-One For Dummies

Home and business users around the globe turn to Microsoft Office and its core applications every day. Whether you're a newcomer or a veteran Office user, this friendly-but-informative guide provides in-depth coverage on all the newest updates and enhancements to the Office 2013 suite. With an overview of tools common to all Office...

Real Time UML Workshop for Embedded Systems (Embedded Technology)
Real Time UML Workshop for Embedded Systems (Embedded Technology)
"As you might expect, there are plenty of UML diagrams. Real-time UML specifications are used throughout, consistent with the purpose of the book. Designers with UML expertise who want to understand how to address real-time applications will find this book useful, as will those in the real-time world who need to understand how to bring UML...
Building an ASP .NET Intranet
Building an ASP .NET Intranet

The authors base the book’s sample intranet on Microsoft’s free best practices example, the IBuySpy Portal, and teach you to quickly create an application that exploits the advanced features of ASP.NET. A full explanation of the IBuySpy Portal architecture is provided, which allows you to maximize product usage.

Further,...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy