Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Page Title Page Copyright Page Contents at a Glance Table of Contents About the Author About the Technical Reviewers Dedication Acknowledgments We Want to Hear from You! Reader Services Introduction Chapter 1. The Scope of Digital Forensics
Popular Myths about Computer Forensics Types of Digital Forensics Evidence Recovered What Skills Must a Digital Forensics Investigator Possess? The Importance of Digital Forensics Job Opportunities A History of Digital Forensics Training and Education Summary Key Terms Assessment
Chapter 2. Windows Operating and File Systems
Physical and Logical Storage Paging File Conversion and Numbering Formats Operating Systems Windows Registry Microsoft Office Microsoft Windows Features Summary Key Terms Assessment
Chapter 3. Handling Computer Hardware
Hard Disk Drives Cloning a PATA or SATA Hard Disk Removable Memory Summary Key Terms Assessment References
Chapter 4. Acquiring Evidence in a Computer Forensics Lab
Lab Requirements Private Sector Computer Forensics Laboratories Computer Forensics Laboratory Requirements Extracting Evidence from a Device Skimmers Steganography Summary Key Terms Assessment
Chapter 5. Online Investigations
Working Undercover Dark Web Investigations Virtual Currencies Website Evidence Background Searches on a Suspect Online Crime Capturing Online Communications Edge Web Browser Summary Key Terms Assessment
Chapter 6. Documenting the Investigation
Obtaining Evidence from a Service Provider Documenting a Crime Scene Seizing Evidence Documenting the Evidence Using Tools to Document an Investigation Writing Reports Using Expert Witnesses at Trial Summary Key Terms Assessment
Chapter 7. Admissibility of Digital Evidence
History and Structure of the United States Legal System Evidence Admissibility Constitutional Law When Computer Forensics Goes Wrong Structure of the Legal System in the European Union (E.U.) Structure of the Legal System in Asia Summary Key Terms Assessment
Chapter 8. Network Forensics & Incident Response
The Tools of the Trade Networking Devices Understanding the OSI Model Introduction to VoIP Incident Response (IR) STIX, TAXII, and Cybox Advanced Persistent Threats Investigating a Network Attack Summary Key Terms Assessment
Chapter 9. Mobile Forensics
The Cellular Network Handset Specifications Mobile Operating Systems Standard Operating Procedures for Handling Handset Evidence Handset Forensics Manual Cellphone Examinations Global Satellite Service Providers Legal Considerations Other Mobile Devices Documenting the Investigation Summary Key Terms Assessment
Chapter 10. Mobile App Investigations
Static versus Dynamic Analysis Dating Apps Rideshare Apps Communication Apps Summary Key Terms Assessment
Chapter 11. Photograph Forensics
National Center for Missing and Exploited Children (NCMEC) Project VIC Case Studies Understanding Digital Photography Examining Picture Files Evidence Admissibility Case Studies Summary Key Terms Assessment
Chapter 12. Mac Forensics
A Brief History iPod Apple WiFi Devices Macintosh File Systems Macintosh Operating Systems macOS Catalina Apple Mobile Devices Performing a Mac Forensic Examination Case Studies Summary Key Terms Assessment
Chapter 13. Case Studies
Silk Road Las Vegas Massacre Zacharias Moussaoui BTK (Bind Torture Kill) Killer Cyberbullying Sports Summary Key Terms Assessment Assignment
Chapter 14. Internet of Things (IoT) Forensics and Emergent Technologies
5G WiFi 6 WiFi Mesh Networks Shodan Mirai Botnet Cryptocurrency Mining Alexa Micro-Chipping Fitness Trackers Apple Watch Action Cameras Police Safety Police Vehicles Vehicle Forensics Low Tech Solution for High Tech Seizures Summary Key Terms Assessment
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion