In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also pr…
This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis …
Politeknik Siber dan Sandi Negara (Poltek SSN) merupakan perguruan institusi pendidikan untuk memenuhi kebutuhan sumber daya manusia di Badan Siber dan Sandi Negara (BSSN). Salah satu fungsi BSSN dalam Peraturan BSSN Nomor 6 tahun 2021 Tentang Organisasi dan Tata Kerja BSSN adalah melaksanaan dukungan investigasi. Kompetensi ini menurut Peraturan BSSN Nomor 11 Tahun 2020 adalah investigasi sibe…
Daftar isi: BAB 1 Komputer forensik BAB 2 Perangkat komputer forensik BAB 3 Metode komputer forensik BAB 4 Standardisasi komputer forensik BAB 5 Skill investigasi BAB 6 Bedah komputer forensik BAB 7 Training dan departemen komputer forensik BAB 8 Perbendaharaan komputer forensik
Terdapat bibliografi dan indeks. Table of Contents Chapter 1. Malware Incident Response Volatile Data Collection and Analysis Tools Non-Volatile Data Collection and Analysis Tools Selected Readings Jurisprudence/RFCS/Technical Specifications Chapter 2. Memory Forensics Chapter 3. Post-Mortem Forensics Chapter 4. Legal Considerations Chapter 5. File Identification and Profili…
Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…
TABLE OF CONTENTS Introduction xvii Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows F…
Terdapat indeks. Table of Contents Chapter 1: Live Response: Collecting Volatile Data Chapter 2: Live Response: Analyzing Volatile Data Chapter 3: Windows Memory Analysis Chapter 4: Registry Analysis Chapter 5: File Analysis Chapter 6: Executable File Analysis Chapter 7: Rootkits and Rootkit Detection Chapter 8: Tying It All Together Chapter 9: Forensic Analysis on a Budget
Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…
Table of contents: Part 1: The Threat Landscape Ch 1 Introduction to Planning & Crisis Ch 2 The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk Part 2: Planning for Crisis Ch 3 A Plan is Preparation Manifested Ch 4 Writing Your Computer Incident Response Plan Part 3: Plan Development - Data Breach Ch 5 Your Data Breach CIRP - Incident Preparation Ch 6 D…