Practical linux forensics : a guide for digital investigators / Bruce Nikkel
Material type:
- 9781718501966
- HV 8079.C65 .N55 2022

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC HV 8079.C65 .N55 2022 (Browse shelf(Opens below)) | c.1 | Available | NULIB000019598 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC HV 8079.C65 .M66 2005 Search and seizure of digital evidence / | GC HV 8079.C65 .M66 2011 Cybercrime : investigating high-technology computer crime / | GC HV 8079.C65 .N45 2010 Guide to computer forensics and investigations / | GC HV 8079.C65 .N55 2022 Practical linux forensics : a guide for digital investigators / | GC HV 8079.C65 .S26 2012 The basics of digital forensics : the primer for getting started in digital forensics / | GC HV 8079.C65 .T76 2020 Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques / | GC HV 8079.C65 .W38 2013 c.1 Digital forensics processing and procedures : meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements / |
Includes index.
Digital forensics overview -- Linux overview -- Extracting evidence from storage devices and filesystems -- Directory layout and forensic analysis of Linux files -- Investigating evidence from Linux log -- Reconstructing system boot and initialization -- Examination of installed software packages -- Identifying network configuration artifacts -- Forensic analysis of time and location -- Reconstructing user desktops and login activity -- Forensic traces of attached peripheral devices -- Closing remarks -- File and directory list for digital investigators.
A thorough resource for forensic investigators, this book covers a variety of methods and techniques for locating and analyzing digital evidence found on modern Linux systems after a security incident or cyberattack. Readers will learn how Linux works from a digital forensics and investigation perspective and how to interpret evidence using tool-independent techniques relevant to any forensic analysis platform.
There are no comments on this title.