Digital forensics basics: a practical guide using windows OS
Material type: TextPublication details: Apress New York 2021Description: xxii, 335 pISBN:- 9781484267332
- 363.25968 HAS
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Book | Indian Institute of Management LRC General Stacks | IT & Decisions Sciences | 363.25968 HAS (Browse shelf(Opens below)) | 1 | Available | 003714 |
Browsing Indian Institute of Management LRC shelves, Shelving location: General Stacks, Collection: IT & Decisions Sciences Close shelf browser (Hides shelf browser)
362.1 NAT Demystifying big data and machine learning for healthcare | 362.1 UND Health tech: | 362.10684 MAD Data-driven healthcare: how analytics and BI are transforming the industry | 363.25968 HAS Digital forensics basics: | 363.25968 MOU Digital forensics in the era of artificial intelligence | 364.168 WEB Coding democracy: how hackers are disrupting power, surveillance, and authoritarianism | 370.72 SRI A beginner's guide to learning analytics |
About this book
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law.
Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use.
Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills.
There are no comments on this title.