LEADER 00000cam a2200913 i 4500 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu|||||||| 008 190316t20192019cau ob 000 0 eng 015 GBB952770|2bnb 016 7 019272079|2Uk 019 1089007816|a1089595640|a1091264626|a1091270363|a1091373938 |a1098167091|a1103271742|a1105177554|a1110860425 |a1112939054|a1113766735|a1122818903|a1129363021 |a1153011747|a1162772796|a1192339500|a1204076479 |a1204084159|a1240516949 020 9781484238387|q(electronic book) 020 1484238389|q(electronic book) 020 |q(paperback) 020 |q(paperback) 020 9781484238394|q(print) 020 1484238397 024 7 10.1007/978-1-4842-3838-7|2doi 024 8 10.1007/978-1-4842-3 024 8 9781484238370 024 8 9781484238387 029 0 AU@|b000065260087 029 1 AU@|b000065066372 029 1 AU@|b000065089591 029 1 AU@|b000065130048 029 1 AU@|b000065230283 029 1 UKMGB|b019272079 029 1 CHVBK|b592047261 029 1 CHNEW|b001084515 029 1 AU@|b000069003787 029 1 AU@|b000074107773 035 (OCoLC)1101075001|z(OCoLC)1089007816|z(OCoLC)1089595640 |z(OCoLC)1091264626|z(OCoLC)1091270363|z(OCoLC)1091373938 |z(OCoLC)1098167091|z(OCoLC)1103271742|z(OCoLC)1105177554 |z(OCoLC)1110860425|z(OCoLC)1112939054|z(OCoLC)1113766735 |z(OCoLC)1122818903|z(OCoLC)1129363021|z(OCoLC)1153011747 |z(OCoLC)1162772796|z(OCoLC)1192339500|z(OCoLC)1204076479 |z(OCoLC)1204084159|z(OCoLC)1240516949 037 CL0501000038|bSafari Books Online 037 7247B602-7FB4-47BF-A0D8-0AAB7E3FB37B|bOverDrive, Inc. |nhttp://www.overdrive.com 040 AU@|beng|erda|epn|cAU@|dOCLCO|dOCLCF|dYDX|dGW5XE|dYDXIT |dEBLCP|dVT2|dUPM|dUMI|dUKMGB|dOH1|dLQU|dTEFOD|dOCLCQ |dOCLCO|dOCLCQ|dOCL|dOCLCQ|dN$T|dIBI|dU3W|dUHL|dCOO|dLEATE |dUKAHL|dBRF|dDCT|dOCLCQ|dOCLCO|dOCLCQ|dPZO|dOCLCQ|dOCLCO |dOCLCL 049 INap 082 04 363.25968 082 04 363.25968|223 099 eBook O'Reilly for Public Libraries 100 1 Hassan, Nihad A.,|eauthor. 245 10 Digital forensics basics :|ba practical guide using Windows OS /|cNihad A. Hassan.|h[O'Reilly electronic resource] 264 1 [Berkeley, California] :|bApress,|c[2019] 264 2 New York, NY :|bDistributed by Springer Science + Business Media 264 4 |c©2019 300 1 online resource (xxii, 335 pages) :|billustrations. 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 text file|bPDF|2rda 500 Includes index. 504 Includes bibliographical references. 505 0 Introduction : Understanding digital forensics -- Essential technical concepts -- Computer forensics lab requirements -- Initial response and first responder tasks -- Acquiring digital evidence -- Analyzing digital evidence -- Windows forensics analysis -- Web browser and E-mail forensics -- Antiforensics techniques -- Gathering evidence from OSINT sources -- Digital forensics report. 520 Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You'll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti- forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques. 542 |f© Copyright 2019 Nihad A. Hassan.|g2019 588 0 Print version record 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Digital forensic science. 650 0 Computer security. 650 0 Computer crimes|xInvestigation. 650 2 Computer Security 650 6 Sécurité informatique. 650 6 Criminalité informatique|xEnquêtes. 650 7 Digital forensic science|2fast 650 7 Computer security|2fast 650 7 Computer crimes|xInvestigation|2fast 773 0 |tSpringer eBooks 776 08 |iPrint version:|aHassan, Nihad A.|tDigital forensics basics.|d[Berkeley, California] : Apress, [2019] |z9781484238370|w(DLC) 2019933884|w(OCoLC)1076548946 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781484238387/?ar |zAvailable on O'Reilly for Public Libraries 938 ProQuest Ebook Central|bEBLB|nEBL5720246 938 YBP Library Services|bYANK|n16082499 938 EBSCOhost|bEBSC|n2035338 938 Askews and Holts Library Services|bASKH|nAH36137295 994 92|bJFN