A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text covers a broad range of topics, including the basics of hard drives and storage media, various data hiding techniques like encryption and steganography, and the identification and handling of hostile code such as viruses and rootkits. Additionally, it provides detailed guidance on investigating both Windows and Unix operating systems, discussing network fundamentals and tracking offenders. The source also emphasizes legal considerations and chain of custody in digital investigations, concluding with an appendix on incident response guidelines for Internet data centers.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Computer-Forensics-Incident-Response-Essentials/dp/0201707195?&linkCode=ll1&tag=cvthunderx-20&linkId=f12618c7a23244165b4acbd7d0e0e029&language=en_US&ref_=as_li_ss_tl
Discover our free courses in tech and cybersecurity, Start learning today:
https://linktr.ee/cybercode_academy