File System Forensic Analysis

Nonfiction, Computers, Networking & Communications
Cover of the book File System Forensic Analysis by Brian Carrier, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Brian Carrier ISBN: 9780134439549
Publisher: Pearson Education Publication: March 17, 2005
Imprint: Addison-Wesley Professional Language: English
Author: Brian Carrier
ISBN: 9780134439549
Publisher: Pearson Education
Publication: March 17, 2005
Imprint: Addison-Wesley Professional
Language: English

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques

 

Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed.

 

Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes

  • Preserving the digital crime scene and duplicating hard disks for "dead analysis"
  • Identifying hidden data on a disk's Host Protected Area (HPA)
  • Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more
  • Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques
  • Analyzing the contents of multiple disk volumes, such as RAID and disk spanning
  • Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques
  • Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more
  • Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools

When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques

 

Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed.

 

Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes

When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

More books from Pearson Education

Cover of the book Google Gmail by Brian Carrier
Cover of the book The History of Technical Analysis by Brian Carrier
Cover of the book Advanced Android Application Development by Brian Carrier
Cover of the book Establishing Goals for Living Rich by Brian Carrier
Cover of the book PHP and MySQL for Dynamic Web Sites, Fourth Edition: Visual QuickPro Guide by Brian Carrier
Cover of the book Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: Foundation learning for the CCNP TSHOOT 642-832 by Brian Carrier
Cover of the book Vine in 10 Minutes, Sams Teach Yourself by Brian Carrier
Cover of the book Optimizing and Troubleshooting Hyper-V Storage by Brian Carrier
Cover of the book Photoshop CS4, Volume 2 by Brian Carrier
Cover of the book Layer 2 VPN Architectures by Brian Carrier
Cover of the book Trends Are an Investor's Best Friend by Brian Carrier
Cover of the book Easy OS X Mountain Lion by Brian Carrier
Cover of the book The Volatility Edge in Options Trading by Brian Carrier
Cover of the book CISSP Exam Cram by Brian Carrier
Cover of the book Level 5: Round the World in Eighty Days by Brian Carrier
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy