Title

Title
Bienvenue sur Biblio-Sciences, site communautaire principalement destiné aux étudiants, élèves et à toute autre personne désirant trouver des documents numériques dans un but académique, ludique ou autre. Explorez Biblio-Sciences où chaque livre est une aventure scientifique qui commence. La connaissance n'attend que vous !

Search

Rechercher des livres par catégories

togglesFiltrer

Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)

Author(s):EC-Council
Collection:
Publisher:Course Technology
Year:2009
Langue: English
Pages: 240 pages
Size:10.27 MB
Extension:PDF


[tab] [content title="Summary"] The **Computer Forensic Series** by EC-Council is a comprehensive and practical resource for individuals seeking to master the skills necessary to investigate cybercrime, track hackers, and gather forensic evidence to support legal proceedings. This series is especially valuable for students, professionals, and anyone preparing for **Certified Hacking Forensic Investigator (C|HFI)** certification. The series covers a broad range of topics, each designed to provide a step-by-step approach to forensic investigation, including how to detect cyberattacks, collect evidence in a forensically sound manner, and understand the technical details behind system intrusions and attacks. ### Overview of the Series: The **Computer Forensic Series** is composed of five key books, each focusing on specific aspects of **Computer Hacking Forensic Investigation (CHFI)**. Together, these books aim to equip the reader with the knowledge and skills necessary to trace cybercriminals, gather admissible evidence, and support successful prosecution. ### Key Features of the Series: - **Forensically Sound Evidence Collection**: The series teaches how to collect digital evidence in a manner that preserves its integrity, ensuring its admissibility in court. - **Advanced Forensic Investigation Techniques**: Each book introduces the reader to various forensic analysis methods, including data recovery, network traffic analysis, and intrusion detection. - **Legal Focus**: The books emphasize preparing evidence for use in legal proceedings, ensuring that the findings are valid and meet legal standards. - **Real-World Application**: Case studies, practical examples, and labs help readers understand how to apply forensic techniques in real-world investigations. ### Key Topics Covered in the Series: 1. **Hard Disks, File Systems, and Operating Systems**: - **File Systems**: This book provides a detailed understanding of different file systems (such as NTFS, FAT32, Ext3/Ext4) used in modern operating systems, explaining how data is stored and retrieved. - **Hard Disk and Digital Media Forensics**: It covers how to examine and recover data from hard disks, digital media devices (USB drives, external hard drives, SD cards, etc.), and memory storage systems. - **Boot Processes**: The book explains how boot processes work on both **Windows** and **Linux** systems, including how to examine boot records for forensic purposes. - **Windows and Linux Forensics**: Detailed forensic analysis techniques for both Windows and Linux operating systems are provided, including how to analyze logs, registry entries, and system files to trace activities. - **Password Cracking and Analysis**: The book covers techniques to uncover and recover passwords using password cracking tools and methods. It also explains the significance of password management in forensic investigations. 2. **Investigating Web Attacks**: - This book focuses on how to investigate attacks targeting web applications and websites. It covers common vulnerabilities such as **SQL injection**, **Cross-Site Scripting (XSS)**, and **Cross-Site Request Forgery (CSRF)**, providing practical guidance on how to recover and analyze logs, traces, and artifacts from web server traffic. 3. **Network Intrusions and Cybercrime**: - A major focus of this book is on investigating network intrusions, identifying cybercrime-related activities, and tracking the actions of intruders in a network environment. The book explores tools and techniques for monitoring network traffic, analyzing intrusion attempts, and understanding the techniques used by attackers in DoS/DDoS attacks, malware attacks, and corporate espionage cases. 4. **Digital Evidence and Incident Response**: - This book details how to identify, collect, and preserve digital evidence in response to incidents such as hacking attempts, data breaches, and insider threats. It includes an overview of incident response procedures and tools, as well as methods for reporting and documenting forensic findings. 5. **Forensic Reporting and Legal Considerations**: - The final book in the series discusses how to properly document forensic investigations, write reports for legal and courtroom purposes, and ensure the integrity of the evidence collected. This book also emphasizes the importance of adhering to legal and ethical standards during digital forensics investigations. ### Skills and Knowledge Gained: - **File System Forensics**: Understanding how files are stored, recovered, and examined on different file systems (NTFS, FAT, Ext3) and devices. - **System Boot and Memory Forensics**: Learn how to analyze boot records, operating system logs, and memory dumps to identify attack traces. - **Network Forensics**: Analyze network traffic and identify signs of intrusion, such as unauthorized access or data exfiltration. - **Incident Response and Digital Evidence**: Learn how to respond to and investigate cyberattacks, including how to preserve digital evidence for later analysis and court proceedings. - **Password Recovery and Cracking**: Gain knowledge of password recovery techniques, including using password crackers and understanding their role in forensic investigations. - **Legal Aspects of Forensics**: Understand the process of documenting and presenting evidence in a court of law, including ensuring its admissibility and integrity. ### Who Should Read the Series: - **Forensic Investigators**: Professionals involved in cybercrime investigations, data recovery, and forensic analysis will find this series invaluable in building their expertise in digital forensics. - **Cybersecurity Professionals**: Security experts, ethical hackers, and penetration testers can use this series to gain a deeper understanding of forensic analysis, helping them track attackers and protect systems. - **Law Enforcement and Legal Professionals**: Police officers, federal agents, and legal professionals who deal with cybercrime or need to understand how to handle digital evidence will benefit from the legal-focused content of this series. - **C|HFI Certification Candidates**: Individuals preparing for the **Certified Hacking Forensic Investigator (C|HFI)** exam will find this series to be an essential resource for understanding the forensic investigation process and tools. ### Why This Series is Important: - **Practical, Hands-On Learning**: The series provides a combination of theoretical knowledge and practical, real-world applications to help learners develop the necessary skills to conduct forensic investigations. - **Comprehensive Coverage**: The books cover all aspects of digital forensics, from data collection to analysis, reporting, and legal considerations, giving readers a holistic understanding of the field. - **Real-World Relevance**: By incorporating real case studies, practical examples, and lab exercises, the series ensures that the reader is well-prepared for real-world forensic challenges. ### Conclusion: The **Computer Forensic Series** by EC-Council is an indispensable resource for anyone involved in digital forensics, from students to professionals. By offering detailed insights into the technical, legal, and investigative aspects of cybercrime, this series provides a strong foundation for anyone seeking to become proficient in tracking cybercriminals, recovering data, and supporting legal proceedings. Whether you're preparing for certification, advancing your career, or dealing with real-world cybercrime investigations, this series is a must-read for building the skills and knowledge needed to succeed in the field of computer forensics. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics) EBOOK PDF EPUB DJVU . Download Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics) EBOOK PDF EPUB DJVU .

Page précédente Accueil Page suivante

Post Share Buttons

Les plus populaires Voir la suite