Practical cyber intelligence: A hands-on guide to digital forensics (Record no. 1779)

MARC details
000 -LEADER
fixed length control field 02730nam a2200217 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250802151157.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250802b2024|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781394256112
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.16
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Jakobsen, Adam Tilmar
Relator term Author
245 ## - TITLE STATEMENT
Title Practical cyber intelligence: A hands-on guide to digital forensics
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxii, 218p.
500 ## - GENERAL NOTE
General note Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process<br/><br/>Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber forensics to collect, preserve, and analyze digital evidence, enabling readers to understand the digital landscape and analyze legacy devices, current models, and models that may be created in the future. Readers will learn how to determine what evidence exists and how to find it on a device, as well as what story it tells about the activities on the device.<br/><br/>Over 100 images and tables are included to aid in reader comprehension, and case studies are included at the end of the book to elucidate core concepts throughout the text.<br/><br/>To get the most value from this book, readers should be familiar with how a computer operates (e.g., CPU, RAM, and disk), be comfortable interacting with both Windows and Linux operating systems as well as Bash and PowerShell commands and have a basic understanding of Python and how to execute Python scripts.<br/><br/>Practical Cyber Intelligence includes detailed information on:<br/><br/>OSINT, the method of using a device’s information to find clues and link a digital avatar to a person, with information on search engines, profiling, and infrastructure mapping<br/>Window forensics, covering the Windows registry, shell items, the event log and much more<br/>Mobile forensics, understanding the difference between Android and iOS and where key evidence can be found on the device<br/>Focusing on methodology that is accessible to everyone without any special tools, Practical Cyber Intelligence is an essential introduction to the topic for all professionals looking to enter or advance in the field of cyber investigation, including cyber security practitioners and analysts and law enforcement agents who handle digital evidence.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Intelligence Analysis and Digital Forensics
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Disk Forensics and Memory Forensics
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Windows Forensics, macOS Forensics and Linux Forensics
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10896970
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 364.16 EB0203 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha