File System Forensic Analysis

File System Forensic Analysis (Repost)  eBooks & eLearning

Posted by lenami at May 9, 2011
File System Forensic Analysis (Repost)

File System Forensic Analysis
Publisher: Addison Wesley | ISBN: 0321268172 | edition 2005 | PDF | 511 pages | 4 mb

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed.

Brian Carrier, "File System Forensic Analysis"  eBooks & eLearning

Posted by Alexpal at Oct. 8, 2005


Brian Carrier, "File System Forensic Analysis"
Addison-Wesley Professional | ISBN 0321268172 | 2005 Year | CHM | 4 Mb | 600 Pages

Forensic Discovery  eBooks & eLearning

Posted by lengen at Jan. 24, 2017
Forensic Discovery

Forensic Discovery by Dan Farmer
English | Jan. 9, 2005 | ISBN: 020163497X | 240 Pages | PDF | 2 MB

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
–Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software and Building Secure Software
"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
–Steve Bellovin, coauthor of Firewalls and Internet Security, Second Edition, and Columbia University professor

Computer Forensics eBooks Collection  eBooks & eLearning

Posted by Rare-1 at April 28, 2017
Computer Forensics eBooks Collection

Computer Forensics eBooks Collection
English | ISBN: N/A | 103 PDF | 1.61 GB

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

"Windows Forensic Analysis DVD Toolkit 2E" by Harlan Carvey  eBooks & eLearning

Posted by exLib at Aug. 3, 2011
"Windows Forensic Analysis DVD Toolkit 2E" by Harlan Carvey

"Windows Forensic Analysis DVD Toolkit 2E" by Harlan Carvey
Eoghan Casey Technical Editor. Second Edition
Sуngrеss, Еlsеviеr Inc. | 2009 | ISBN: 1597494224 9781597494229 | 507 pages | PDF/djvu | 6/8 MB

Author has brought this book up-to-date to give you: the responder, examiner, or analyst the must-have tool kit for your job. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline when an incident occurs, but due to staffing and budget constraints do not have the necessary knowledge to respond effectively.

Forensic Analysis on the Cutting Edge: New Methods for Trace Evidence Analysis  eBooks & eLearning

Posted by thingska at April 27, 2017
Forensic Analysis on the Cutting Edge: New Methods for Trace Evidence Analysis

Forensic Analysis on the Cutting Edge: New Methods for Trace Evidence Analysis by Robert D. Blackledge
English | 2007 | ISBN: 0471716448, 9780471716440 | 496 Pages | PDF | 38.94 MB

Android File System  eBooks & eLearning

Posted by IrGens at April 7, 2017
Android File System

Android File System
.MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 64 kbps, 2 Ch | 2.5 hours | 681 MB
Instructor: Sriyank Siddhartha

Lynda - C# File System Tips and Tricks  eBooks & eLearning

Posted by U.N.Owen at April 4, 2017
Lynda - C# File System Tips and Tricks

Lynda - C# File System Tips and Tricks
Size: 192 MB | Duration: 1h 16m | Video: AVC (.mp4) 1280x720 30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

You may often need to access the underlying file system within your C# application.
Taphonomy of Human Remains: Forensic Analysis of the Dead and the Depositional Environment

Eline M. J. Schotsmans and Nicholas Márquez–Grant, "Taphonomy of Human Remains: Forensic Analysis of the Dead and the Depositional Environment"
English | ISBN: 1118953320 | 2017 | 544 pages | PDF | 13 MB

Pluralsight - HTML5 Web Storage, IndexedDB and File System [repost]  eBooks & eLearning

Posted by house23 at March 11, 2017
Pluralsight - HTML5 Web Storage, IndexedDB and File System [repost]

Pluralsight - HTML5 Web Storage, IndexedDB and File System
WMV | WMV3 223kbps | English | 1024x768 | 15fps | 5h 26mins | WMA2 stereo 104kbps | 1.05 GB
Genre: Video Training

Learn to use HTML5 to persist data on the client using Web Storage (local and session storage), the client-side object database known as IndexedDB and the in-browser file system. In this course you are introduced to each persistence medium and will learn to abstract away the complexities of using the raw APIs. Discussion of each technology also includes a "real-life" sample to demonstrate how you can use capabilities shown in this course in context of an application scenario.