770 records matched your query
03513aam a2200421Ii 4500 001 EB8F4C96C7F211EAB1F2873797128E48 003 SILO 005 20200717010022 008 190117s2019 caua 001 0 eng d 020 $a 9781484244593 020 $a 1484244591 035 $a (OCoLC)1082231032 040 $a YDX $b eng $e rda $c YDX $d BDX $d TOH $d UKMGB $d OCLCO $d OCLCF $d ZQP $d JRZ $d NYP $d OCL $d MRB $d SILO 050 4 $a QA76.9.A25 $b R43 2019 100 1 $a Reddy, Niranjan, $e author. 245 10 $a Practical cyber forensics : $b an incident-based approach to forensic investigations / $c Niranjan Reddy. 264 1 $a [Berkeley, California] : $b Apress, $c [2019] 300 $a xxvi, 488 pages : $b illustrations ; $c 26 cm 500 $a Includes index. 520 $a Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, youll shift your focus to network forensics, where you cover the various tools available to make your network forensics process less complicated. Following this, you will work with cloud and mobile forensic techniques by considering the concept of forensics as a service (FaSS), giving you cutting-edge skills that will future-proof your career. Building on this, you will learn the process of breaking down malware attacks, web attacks, and email scams with case studies to give you a clearer view of the techniques to be followed. Another tricky technique is SSD forensics, so the author covers this in detail to give you the alternative analysis techniques youll need. To keep you up to speed on contemporary forensics, Practical Cyber Forensics includes a chapter on Bitcoin forensics, where key crypto-currency forensic techniques will be shared. Finally, you will see how to prepare accurate investigative reports. You will: Carry out forensic investigation on Windows, Linux, and macOS systems Detect and counter anti-forensic techniques Deploy network, cloud, and mobile forensics Investigate web and malware attacks Write efficient investigative reports. 505 0 $a Introduction to cyber forensics -- Windows forensics -- Linux forensics -- Mac OS forensics -- Anti-forensics -- Network forensics -- Mobile forensics -- Cloud forensics -- Malware forensics -- Web attack forensics -- Emails and email crime -- Solid state device (SSD) forensics -- Bitcoin forensics -- Cyber law and cyberwarfare -- Investigative reports and legal acceptance. 650 0 $a Computer crimes $x Investigation. 650 0 $a Computer networks $x Security measures. 650 0 $a Computer security. 650 0 $a Forensic sciences $x Technological innovations. 650 0 $a Electronic evidence. 650 0 $a Evidence, Criminal. 650 0 $a Criminal investigation. 650 7 $a COMPUTERS / Security / General. $2 bisacsh 650 7 $a Computer security. $2 fast $0 (OCoLC)fst00872484 650 7 $a Computer networks $x Security measures. $2 fast $0 (OCoLC)fst00872341 650 7 $a Computer crimes $x Investigation. $2 fast $0 (OCoLC)fst00872065 650 7 $a Criminal investigation. $2 fast $0 (OCoLC)fst00883201 650 7 $a Electronic evidence. $2 fast $0 (OCoLC)fst01746886 650 7 $a Evidence, Criminal. $2 fast $0 (OCoLC)fst00917210 941 $a 1 952 $l OVUX522 $d 20210721013634.0 956 $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=EB8F4C96C7F211EAB1F2873797128E48Initiate Another SILO Locator Search