000863506 000__ 04070cam\a2200469Ma\4500 000863506 001__ 863506 000863506 005__ 20230306145749.0 000863506 006__ m\\\\\o\\d\\\\\\\\ 000863506 007__ cr\un\nnnunnun 000863506 008__ 190304s2019\\\\nyu\\\\\ob\\\\000\0\eng\d 000863506 019__ $$a1089007816$$a1089595640$$a1091264626$$a1091270363$$a1091373938$$a1098167091$$a1103271742$$a1105177554$$a1110860425 000863506 020__ $$a9781484238387$$q(electronic book) 000863506 020__ $$a1484238389$$q(electronic book) 000863506 020__ $$z1484238370 000863506 020__ $$z9781484238370 000863506 0247_ $$a10.1007/978-1-4842-3838-7$$2doi 000863506 0248_ $$a10.1007/978-1-4842-3 000863506 035__ $$aSP(OCoLC)on1101075001 000863506 035__ $$aSP(OCoLC)1101075001$$z(OCoLC)1089007816$$z(OCoLC)1089595640$$z(OCoLC)1091264626$$z(OCoLC)1091270363$$z(OCoLC)1091373938$$z(OCoLC)1098167091$$z(OCoLC)1103271742$$z(OCoLC)1105177554$$z(OCoLC)1110860425 000863506 040__ $$aAU@$$beng$$erda$$epn$$cAU@$$dOCLCO$$dOCLCF$$dYDX$$dGW5XE$$dYDXIT$$dEBLCP$$dVT2$$dUPM$$dUMI$$dUKMGB$$dOH1$$dLQU$$dTEFOD$$dOCLCQ$$dOCLCO 000863506 049__ $$aISEA 000863506 050_4 $$aHV8079.C65$$bD54 2019 000863506 08204 $$a364.16/8$$223 000863506 1001_ $$aHassan, Nihad A.,$$eauthor. 000863506 24510 $$aDigital forensics basics :$$ba practical guide using Windows OS /$$cNihad A. Hassan. 000863506 264_1 $$aNew York, New York :$$bSpringer,$$c2019. 000863506 300__ $$a1 online resource (347 pages) 000863506 336__ $$atext$$btxt$$2rdacontent 000863506 337__ $$acomputer$$bc$$2rdamedia 000863506 338__ $$aonline resource$$bcr$$2rdacarrier 000863506 504__ $$aIncludes bibliographical references. 000863506 5050_ $$aIntroduction : Understanding digital forensics -- Essential technical concepts -- Computer forensics lab requirements -- Initial response and first responder tasks -- Acquiring digital evidence -- Analyzing digital evidence -- Windows forensics analysis -- Web browser and E-mail forensics -- Antiforensics techniques -- Gathering evidence from OSINT sources -- Digital forensics report. 000863506 506__ $$aAccess limited to authorized users. 000863506 520__ $$aUse this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You'll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques. 000863506 588__ $$aDescription based on online resource; title from digital title page (viewed on March 14, 2019). 000863506 650_0 $$aDigital forensic science. 000863506 650_0 $$aComputer crimes$$xInvestigation. 000863506 77608 $$iPrint version:$$z1484238370$$z9781484238370$$w(OCoLC)1076548946 000863506 85280 $$bebk$$hSpringerLink 000863506 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-3838-7$$zOnline Access$$91397441.1 000863506 909CO $$ooai:library.usi.edu:863506$$pGLOBAL_SET 000863506 980__ $$aEBOOK 000863506 980__ $$aBIB 000863506 982__ $$aEbook 000863506 983__ $$aOnline 000863506 994__ $$a92$$bISE