Normal view MARC view ISBD view

Digital forensic: the fascinating world of digital evidences

By: Jain, Nilakshi.
Contributor(s): Kalbande, Dhananjay R.
Publisher: New Delhi Wiley India 2017Description: xxvii,470 p. | Binding - Paperback |.ISBN: 978-81-265-6574-0.Subject(s): Computer EngineeringDDC classification: 5.8
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 1.0 (1 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
 Text Books Text Books School of Engineering & Technology
Reference Section
Reference 005.8 JAI/KAL (Browse shelf) Not For Loan E13005
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 JAI/KAL (Browse shelf) Available E13006
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 JAI/KAL (Browse shelf) Available E13007
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 JAI/KAL (Browse shelf) Available E13008
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 JAI/KAL (Browse shelf) Available E13009
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 JAI/KAL (Browse shelf) Available E13010
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 JAI/KAL (Browse shelf) Not For Loan AE528
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 JAI/KAL (Browse shelf) Not For Loan AE529
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 JAI/KAL (Browse shelf) Not For Loan AE530
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 JAI/KAL (Browse shelf) Not For Loan AE531
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 JAI/KAL (Browse shelf) Not For Loan AE532
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 JAI/KAL (Browse shelf) Not For Loan AE533
Total holds: 1

This book is for those who desire to learn more about investigating and fighting digital crimes. It covers latest challenges faced in digital forensic like email forensic, mobile forensic and cloud forensic. It also sequentially explains disk forensic, network forensic, memory forensic, mobile forensic and cloud forensic. The lucid content of the book and the questions provided in each chapter help the learners to prepare themselves for digital forensic competitive exams. Special Features ·Provides comprehensive overview of the subject from cybercrime to digital forensic investigation and its area. ·Completely covers Live Forensic: Windows and Linux. ·Provides the standard format for writing investigation report with sample case reports. ·Elaborates topics such as email forensic, mobile forensic and cloud forensic. ·Explains all digital forensic process models and various computer forensic tools. ·Demonstrates Lab Experiments including email forensic and cloud forensic. Table of Content Preface Acknowledgements About the Authors 1 Introduction to Computer Crimes 1.1 Introduction to Cybercrime 1.2 Categories of Cybercrimes 1.3 Types of Cybercrimes 1.4 The Internet Spawns Crime 1.5 Worms Versus Viruses 1.6 Role of Computers in Crimes 1.7 Cybercrime Statistics in India 1.8 Prevention of Cybercrime 2 Digital Forensic 2.1 Introduction to Digital Forensic 2.2 History of Forensic 2.3 Rules of Computer/Digital Forensic 2.4 Digital Forensic as a Discipline 2.5 Definition of Digital Forensic 2.6 Digital Forensic Investigations 2.7 Goal of Digital Forensic Investigation 2.8 Various DFI Process/Models/Framework 2.9 Ethical Issues 3 Digital Evidences 3.1 Introduction 3.2 What is Digital Evidence? 3.3 Rules of Digital Evidence 3.4 Characteristics of Digital Evidence 3.5 Types of Evidence 3.6 Challenges in Evidence Handling 3.7 Volatile Evidence 3.8 Evidence Handling Procedures 3.9 Ethical Issues/Legal Principles of Digital Evidence 3.10 Digital Evidence and Metadata 4 Ethical Hacking Methodology and Tools 4.1 Introduction 4.2 Types of Hackers 4.3 Reason for Hacking 4.4 Preventions from Hackers 4.5 Impact of Hacking 4.6 Steps Performed by Hackers 4.7 What is Ethical Hacking? 4.8 Who is an Ethical Hacker? 4.9 Ethical Issues 4.10 Ethical Hacking Process 4.11 Working of an Ethical Hacker 4.12 Identifying Types of Ethical Hacks 4.13 Different Tools for Ethical Hacking 5 Incidence Response Process 5.1 Introduction 5.2 Goals of Incident Response 5.3 People Involved in Incident Response Process 5.4 Incident Response Methodology 5.5 Activities in Initial Response 5.6 Phases after Detection of an Incident 6 Data Collection 6.1 Introduction 6.2 The Facts in a Criminal Case 6.3 People Involved in Data Collection Techniques 6.4 Live Data Collection 6.5 Live Data Collection from Windows System 6.6 Live Data Collection from UNIX System 7 Forensic Duplication 7.1 Introduction to Forensic Duplication 7.2 Rules of Forensic Duplication (Thumb Rule) 7.3 Necessity of Forensic Duplication 7.4 Forensic Duplicates as Admissible Evidence 7.5 Important Terms in Forensic Duplicate 7.6 Forensic Duplication Tool Requirements 7.7 Creating a Forensic Duplicate of a Hard Drive 7.8 Creating a Qualified Forensic Duplicate of a Hard Drive 8 File Systems 8.1 File Systems 8.2 Various Types of File Systems 8.3 Introduction to Storage Layers 8.4 Hard Disk Drive 8.5 Forensic Analysis of File Systems 9 Data Analysis 9.1 Preparation Steps for Forensic Analysis 9.2 Investigating Windows Systems 9.3 Investigating UNIX Systems 9.4 Hacker Tools 10 Network Forensic 10.1 Introduction to Intrusion Detection System 10.2 Types of Intrusion Detection System 10.3 Advantages and Disadvantages of IDS 10.4 Understanding Network Intrusions and Attacks 10.5 Recognizing Pre-Intrusion/Attack Activities 10.6 Port Scans 10.7 Address Spoofing 10.8 Attacking with Trojans, Viruses, and Worms 10.9 Understanding Password Cracking 10.10 Understanding Technical Exploits 10.11 Collecting Network-Based Evidenc

There are no comments for this item.

Log in to your account to post a comment.
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha