Inicio > > Seguridad informática > Privacidad y protección de datos > Digital Forensics with Kali Linux - Second Edition
Digital Forensics with Kali Linux - Second Edition

Digital Forensics with Kali Linux - Second Edition

Shiva V. N. Parasram

52,17 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2020
Materia
Privacidad y protección de datos
ISBN:
9781838640804
52,17 €
IVA incluido
Disponible

Selecciona una librería:

  • Donde los libros
  • Librería 7artes
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book Description Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is for This Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
    Disponible

    22,04 €

  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Cybercrime
    Denise M. Chatam
    Cybercrime: Secure IT or Lose IT looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements. 3 ...
    Disponible

    21,03 €

  • Have You Been Hacked Yet?
    N. Stakhanova & O. Stakhanov
    Do you or someone in your house:have a computer, an iPad, or a smartphone? browse the internet, use e-mail or have a Facebook, Twitter, LinkedIn or other social account? ordo online banking, or purchase things online? If your answer is "yes" to any of the above questions, than it's not a question of "if", but "when" cybercriminals will try to steal your or your loved ones&#...

Otros libros del autor

  • Digital Forensics with Kali Linux - Third Edition
    Shiva V. N. Parasram
    Explore various digital forensics methodologies and frameworks and manage your cyber incidents effectivelyPurchase of the print or Kindle book includes a free PDF eBookKey Features:Gain red, blue, and purple team tool insights and understand their link with digital forensicsPerform DFIR investigation and get familiarized with Autopsy 4Explore network discovery and forensics too...
    Disponible

    63,42 €