Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Buy

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.

You’ll learn how to:
–Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
–Protect attached evidence media from accidental modification
–Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
–Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
–Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
–Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
–Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media

With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

(HTML tags aren't allowed.)

AutoCAD 2004 and AutoCAD LT 2004: No Experience Required
AutoCAD 2004 and AutoCAD LT 2004: No Experience Required
AutoCAD 2004 and AutoCAD LT 2004: No Experience Required is your step-by-step introduction to the latest versions of AutoCAD and AutoCAD LT, the industry-leading design and drafting programs used by architects, engineers, drafters, and design teams worldwide. Inside this perfectly-paced guide are the clear-cut...
MCSA/MCSE 70-294 Exam Cram: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
MCSA/MCSE 70-294 Exam Cram: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
MCSA/MCSE 70-294 Exam Cram, Second Edition is the #1-selling quick-study guide to help you pass the 70-294 exam from Microsoft, which is one of the four core exams in the MCSE 2003 and MCSA 2003 certification programs. This new edition covers all exam objectives, including how to implement and manage an active...
Advanced CMOS Cell Design (Professional Engineering)
Advanced CMOS Cell Design (Professional Engineering)
Our fi rst book, Basics of CMOS Cell Design, covered integrated circuit technology scale down, the MOS device model, layout and performance perspectives. It also included an extensive study of basic gates, interconnect and analog cells. We introduced basic cell design and simulation using user-friendly educational tools, Microwind and Dsch,...

Windows Vista (Missing Manual)
Windows Vista (Missing Manual)
Windows Vista is Microsoft's most important software release in more than a decade. It offers users an abundance of new and upgraded features that were more than five years in the making: a gorgeous, glass-like visual overhaul; superior searching and organization tools; a multimedia and collaboration suite; and above all, a massive, top-to-bottom...
Unleashing Web 2.0: From Concepts to Creativity
Unleashing Web 2.0: From Concepts to Creativity
Dr. Gottfried Vossen and Stephen Hagemann have very clearly explained the transition to the new read/write era of the Webalso known as Web 2.0. This book will help you understand the ongoing evolution of the Web, and push you to create applications that take advantage of the read/write Web. Richard MacManus, Editor, Read/WriteWeb...
User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy