Digital forensic (Record no. 15024)

MARC details
000 -LEADER
fixed length control field nam a22 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20211122110139.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210405b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788126578399
040 ## - CATALOGING SOURCE
Transcribing agency AIKTC-KRRC
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title ENG
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number DDC23
Classification number 005.8
Item number JAI
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 10434
Personal name Jain, Nilakshi
245 ## - TITLE STATEMENT
Title Digital forensic
250 ## - EDITION STATEMENT
Edition statement 1st
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. Wiley India
Date of publication, distribution, etc. 2019
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 301p.
Other physical details | Binding - Paperback |
Dimensions 23.6*18 cm
520 ## - SUMMARY, ETC.
Summary, etc. Digital Forensic is for those who desire to learn more about investigating and fighting digital crimes. This book will also help for computer professionals who want to move into the rapidly growing security field and who are considering shifting their career focus to law enforcement and criminal investigation. It is important that computer security personnel expand their knowledge of forensic processes and keep their understanding of investigative and preventive procedures up-to-date. To complete this goal, this book covers latest challenges faced in digital forensic. This book sequentially explains disk forensic, network forensic, and memory forensic.
Expansion of summary note Table of Contents: <br/><br/>Chapter 1 Introduction to Computer Crimes and Ethical Hacking<br/><br/>1.1 Introduction to Cybercrime<br/><br/>1.2 Categories of Cybercrimes<br/><br/>1.3 Types of Cybercrimes<br/><br/>1.4 The Internet Spawns Crime<br/><br/>1.5 Worms Versus Viruses<br/><br/>1.6 Computer’s Role in Crimes<br/><br/>1.7 Cybercrime Statistics in India<br/><br/>1.8 Prevention of Cybercrime<br/><br/>1.9 Definition of Hacker<br/><br/>1.10 Definition of Crackers<br/><br/>1.11 Definition of Phreakers<br/><br/>1.12 Ethical Hacking<br/><br/>1.13 Difference between Hacking and Ethical Hacking<br/><br/>1.14 Steps of Ethical Hacking<br/><br/>1.15 Exploring Some Tools for Ethical Hacking<br/><br/>1.16 What to Do if Been Hacked?<br/><br/> <br/><br/>Chapter 2 Introduction to Digital Forensics and Digital Evidences<br/><br/>2.1 Introduction to Digital Forensic<br/><br/>2.2 Need of Digital Forensic<br/><br/>2.3 Rules of Computer/Digital Forensic<br/><br/>2.4 Types of Digital Forensics<br/><br/>2.5 Ethical Issues<br/><br/>2.6 Digital Forensic Investigations<br/><br/>2.7 Introduction to Digital Evidences<br/><br/>2.8 Rules of Digital Evidence<br/><br/>2.9 Characteristics of Digital evidence<br/><br/>2.10 Types of Evidence<br/><br/>2.11 Challenges in Evidence Handling<br/><br/> <br/><br/>Chapter 3 Incidence Response Process<br/><br/>3.1 Introduction<br/><br/>3.2 People Involved in Incident Response Process<br/><br/>3.3 Incident Response Process<br/><br/>3.4 Incident Response Methodology<br/><br/>3.5 Activities in Initial Response<br/><br/>3.6 Phases after Detection of an Incident<br/><br/> <br/><br/>Chapter 4 Live Data Collection<br/><br/>4.1 Introduction<br/><br/>4.2 The Facts in a Criminal Case<br/><br/>4.3 People Involved in Data Collection Techniques<br/><br/>4.5 Live Data collection from UNIX System<br/><br/> <br/><br/>Chapter 5 Forensic Duplication<br/><br/>5.1 Introduction to Forensic Duplication<br/><br/>5.2 Rules of Forensic Duplication (Thumb Rule)<br/><br/>5.3 Necessity of Forensic Duplication<br/><br/>5.4 Forensic Duplicates as Admissible Evidence<br/><br/>5.5 Important Terms in Forensic Duplicate<br/><br/>5.6 Forensic Image Formats<br/><br/>5.7 Traditional Duplication<br/><br/>5.8 Live System Duplication<br/><br/>5.9 Forensic Duplication Tool Requirements<br/><br/>5.10 Creating a Forensic Duplicate of a Hard Drive<br/><br/>5.11 Creating a Qualified Forensic Duplicate of a Hard Drive<br/><br/> <br/><br/>Chapter 6 Disk and File System Analysis<br/><br/>6.1 Media Analysis Concepts<br/><br/>6.2 Partitioning and Disk Layouts<br/><br/>6.3 Special Containers<br/><br/>6.4 Hashing<br/><br/>6.5 Carving<br/><br/>6.6 Forensic Imaging<br/><br/> <br/><br/>Chapter 7 Data Analysis<br/><br/>7.1 Preparation Steps for Forensic Analysis<br/><br/>7.2 Investigating Windows Systems<br/><br/>7.3 Investigating UNIX Systems<br/><br/>7.4 Investigating Applications<br/><br/>7.5 Malware Handling<br/><br/> <br/><br/>Chapter 8 Network Forensic<br/><br/>8.1 Introduction to Network Forensic<br/><br/>8.2 Understanding Password Cracking<br/><br/>8.3 Understanding Technical Exploits<br/><br/>8.4 Introduction to Intrusion Detection System<br/><br/>8.5 Types of Intrusion Detection System<br/><br/>8.6 Understanding Network Intrusions and Attacks<br/><br/>8.7 Analyzing Network Traffic<br/><br/>8.8 Collecting Network-Based Evidence<br/><br/>8.9 Evidence Handling<br/><br/>8.10 Investigating Routers<br/><br/>8.12 Using Routers as Response Tools<br/><br/> <br/><br/>Chapter 9 Report Writing<br/><br/>9.1 Goals of Report<br/><br/>9.2 Layout of an Investigative Report<br/><br/>9.3 Guidelines for Writing a Report<br/><br/>9.4 Sample for Writing a Report<br/><br/> <br/><br/>Chapter 10 Computer Forensics Tools<br/><br/>10.1 Introduction to Computer Forensic Tools<br/><br/>10.2 Needs of Computer Forensics Tool<br/><br/>10.3 Types of Computer Forensics Tools<br/><br/>10.4 Tasks Performed by Computer Forensics Tools<br/><br/>10.5 Study of Digital Forensic Tools
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4622
Topical term or geographic name entry element Computer Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 14059
Personal name Kalbande, Dhananjay R.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Circulation Departmental Library - SOET Departmental Library - SOET Departmental Library - CO 05/04/2021   005.8 JAI DE0337 02/07/2024 05/04/2021 Departmental Books
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.