ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Networking / Vendor Specific

File System Forensic Analysis

| £41.65 | €46.84 | Ca$67.58 | Au$66.69
by Brian Carrier
What is this?DRM-EPUB by download  |  $49.99
What is this?DRM-PDF by download  |  $49.99
add to wish list
File System Forensic Analysis by Brian Carrier

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques

Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed.

Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes

  • Preserving the digital crime scene and duplicating hard disks for "dead analysis"
  • Identifying hidden data on a disk's Host Protected Area (HPA)
  • Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more
  • Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques
  • Analyzing the contents of multiple disk volumes, such as RAID and disk spanning
  • Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques
  • Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more
  • Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools

When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 752596

Ebook Details
Pages: 600
Size: 4.0 MB
Publisher: Addison Wesley Professional
Date published:   2005
ISBN: 9780134439549 (DRM-EPUB)
9780321374752 (DRM-PDF)

DRM Settings
Copying:of 30 selections every 30 days allowed
Printing:of 30 pages every 30 days allowed
Read Aloud:  allowed

Territory Restrictions
This ebook will NOT be sold to customers with a billing address in:
Afghanistan, Algeria, Belarus, Bosnia and Herzegowina, Congo, Congo (The Democratic Republic of the), Cote D'Ivoire, Cuba, Indonesia, Iran (Islamic Republic of), Iraq, Korea (Democratic People's Republic of), Liberia, Libyan Arab Jamahiriya, Macedonia (The Former Yugoslav Republic of), Myanmar, Nigeria, Sudan, Syrian Arab Republic, Zimbabwe

This product is listed in the following category:

Nonfiction > Computers > Networking > Vendor Specific

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016