Description
Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed.
Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools―including tools he personally developed.
Coverage includes
- Preserving the digital crime scene and duplicating hard disks for "dead analysis"
- Identifying hidden data on a disk's Host Protected Area (HPA)
- Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more
- Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques
- Analyzing the contents of multiple disk volumes, such as RAID and disk spanning
- Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques
- Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more
- Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools
Details
Are you a digital investigator looking to master the art of file system analysis? Look no further! Introducing the File System Forensic Analysis Book - the definitive guide to understanding and testifying about how file system analysis is performed. Authored by renowned security expert Brian Carrier, this comprehensive and illustrated reference will equip you with the knowledge and skills to discover hidden evidence, recover deleted data, and validate your tools.
With a detailed overview of investigation and computer foundations, Carrier delves into contemporary volume and file systems, offering crucial information to help you navigate complex scenarios. Analyze DOS, Apple, GPT partitions, BSD disk labels, and Sun Volume Table of Contents using key concepts, data structures, and specific techniques. Gain expertise in analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems. Uncover valuable evidence with the help of open source file system analysis tools, including ones developed by Carrier himself.
Preserving the digital crime scene, recovering data from "dead analysis," accessing source data, and utilizing error handling techniques are just a few of the invaluable skills you'll acquire. Whether you're a digital forensics specialist, law enforcement officer, or corporate security specialist, this book is an indispensable resource that will take your forensic investigations to the next level.
Don't miss out on the chance to become an expert in file system analysis! Be empowered with the knowledge you need to solve complex cases. Get your copy of the File System Forensic Analysis Book today.
Click here to order now!
Discover More Best Sellers in Networking & Cloud Computing
Shop Networking & Cloud Computing
$37.99
Networking & Cloud Computing - Salesforce AppExchange Success Blueprint: Transform your ideas into profitable and scalable Salesforce applications
Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup
$25.00
Networking & Cloud Computing - Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup
Introduction to Networking: How the Internet Works
$3.99
Networking & Cloud Computing - Introduction to Networking: How the Internet Works
$34.99
Networking & Cloud Computing - iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
$59.99
Networking & Cloud Computing - Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
$54.97
Networking & Cloud Computing - (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
$5.38
Networking & Cloud Computing - WTF Is My Password: password book, password log book and internet password organizer, alphabetical password book, Logbook To Protect Usernames and ... notebook, password book small 6” x 9”
$7.99
Networking & Cloud Computing - WHAT THE FUCK IS MY PASSWORD: Internet Password Logbook, Organizer, Tracker, Funny White Elephant Gag Gift, Secret Santa Gift Exchange Idea, Book Design Cover for an elegant look and feel.


