Digital forensics explained / Edited by Greg Gogolin
Material type:
- 9780367503437
- HV 8079.C65 .D54 2021

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Computer Science | GC HV 8079.C65 .D54 2021 (Browse shelf(Opens below)) | c.1 | Available | NULIB000019539 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Computer Science Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC HF 5548.115 .T46 1991 Learning WordPerfect 5.1 / | GC HF 5548 .B73 2008 Problem-solving cases in Microsoft Access and Excel / | GC HV 8079.C65 .C37 2012 Windows forensic analysis toolkit : advanced analysis techniques for Windows 7 / | GC HV 8079.C65 .D54 2021 Digital forensics explained / | GC JF 799 .E443 2016 Electronic participation : 8th IFIP WG 8.5 International Conference, EPART 2016, Guimares, Portugal, September 5-8, 2016 proceedings / | GC JN 97.A56 .E63 2013 E- participation in Southern Europe and the Balkans : issues of democracy and participation via electronic media / | GC P 306.5 .H68 2009 Translation / |
Includes index.
1. What is digital forensics, and what should you know about it? -- 2. Digital forensic approaches and best practices -- 3. Digital forensics tool kit -- 4. Internet and e-mail examinations -- 5. Mobile forensics -- 6. Cloud computing and digital forensics -- 7. Law enforcement incident response -- 8. Report writing and presentation -- 9. Social media forensics -- 10. Social engineering forensics -- 11. Anti-forensics -- 12. Link and visual analysis -- 13. Psychological, ethical, and cultural implications of digital forensics -- 14. Someone is watching -- 15. The realities of digital forensic practice.
Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations.
There are no comments on this title.