Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x

Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the late...

Full description

Saved in:
Bibliographic Details
Main Author: Parasram, Shiva V. N. (Author)
Format: Book
Language:English
Published: Birmingham Packt Publishing 2020
Edition:Second edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :HV 8079.C65

MARC

LEADER 00000nam a2200000 c 4500
001 94416
003 MY-KLNDU
005 20241220004100.0
008 230513 2020 xxka 001 0 eng d
020 |a 9781838640804 (pbk) 
039 9 |a 202402070757  |b rafizah  |y 202305130940  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a HV 8079.C65 
090 |a HV 8079.C65  |b P37 2020 
100 1 |a Parasram, Shiva V. N.  |e author 
245 1 0 |a Digital forensics with Kali Linux  |b perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x  |c Shiva V. N. Parasram 
250 |a Second edition 
264 1 |a Birmingham  |b Packt Publishing  |c 2020 
264 4 |c © 2020 
300 |a xi, 327 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
520 |a Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. 
592 |a 42469  |b 20/7/2023  |c RM166.67  |h Bookline Services 
650 0 |a Computer crimes  |x investigation 
999 |a vtls000105259  |c 94416  |d 94416