Description
Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed.
Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools―including tools he personally developed.
Coverage includes
- Preserving the digital crime scene and duplicating hard disks for "dead analysis"
- Identifying hidden data on a disk's Host Protected Area (HPA)
- Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more
- Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques
- Analyzing the contents of multiple disk volumes, such as RAID and disk spanning
- Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques
- Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more
- Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools
Details
Are you a digital investigator looking to master the art of file system analysis? Look no further! Introducing the File System Forensic Analysis Book - the definitive guide to understanding and testifying about how file system analysis is performed. Authored by renowned security expert Brian Carrier, this comprehensive and illustrated reference will equip you with the knowledge and skills to discover hidden evidence, recover deleted data, and validate your tools.
With a detailed overview of investigation and computer foundations, Carrier delves into contemporary volume and file systems, offering crucial information to help you navigate complex scenarios. Analyze DOS, Apple, GPT partitions, BSD disk labels, and Sun Volume Table of Contents using key concepts, data structures, and specific techniques. Gain expertise in analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems. Uncover valuable evidence with the help of open source file system analysis tools, including ones developed by Carrier himself.
Preserving the digital crime scene, recovering data from "dead analysis," accessing source data, and utilizing error handling techniques are just a few of the invaluable skills you'll acquire. Whether you're a digital forensics specialist, law enforcement officer, or corporate security specialist, this book is an indispensable resource that will take your forensic investigations to the next level.
Don't miss out on the chance to become an expert in file system analysis! Be empowered with the knowledge you need to solve complex cases. Get your copy of the File System Forensic Analysis Book today.
Click here to order now!
Discover More Best Sellers in Networking & Cloud Computing
Shop Networking & Cloud Computing
Screens and Teens: Connecting with Our Kids in a Wireless World
Networking & Cloud Computing - Screens and Teens: Connecting with Our Kids in a Wireless World
Terraform: Up and Running: Writing Infrastructure as Code
Networking & Cloud Computing - Terraform: Up and Running: Writing Infrastructure as Code
Learning Go: An Idiomatic Approach to Real-World Go Programming
Networking & Cloud Computing - Learning Go: An Idiomatic Approach to Real-World Go Programming
Networking & Cloud Computing - The Everything Guide to Online Genealogy: Trace Your Roots, Share Your History, and Create Your Family Tree (Everything® Series)
Data Science on AWS: Implementing End-to-End, Continuous AI and Machine Learning Pipelines
Networking & Cloud Computing - Data Science on AWS: Implementing End-to-End, Continuous AI and Machine Learning Pipelines
Networking & Cloud Computing - Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy
Networking & Cloud Computing - Shit I Can't Remember: An Organizer for All Your Passwords and Shit | Passwork keeper | Pass word keeper | Shiti Cant Remember Notebook & password book | Logbook | Shot I Can't Remember.
Deep Dive: Exploring the Real-world Value of Open Source Intelligence
Networking & Cloud Computing - Deep Dive: Exploring the Real-world Value of Open Source Intelligence


