官术网_书友最值得收藏!

Preface

In today's world, new threats, breaches, and malicious activities are discovered and published in the news, websites, and portals quite regularly. As much as we try to secure our data, systems, and networks to the best of our abilities, breaches occur. In an effort to understand what took place, we turn to the field of digital forensics. Although still a relatively new field, forensics has become just as important as security, especially when considering the wealth of information available to anyone accessing the internet with the intent of carrying out malicious activity. Thankfully, digital fingerprints and artifacts are sometimes left behind, whether in a deleted or hidden file, email, in someone's browsing history, remote connection list, or even mobile text message.

This book gives even the absolute beginner a structured approach with best practices to carry out their own investigations using the popular and powerful forensics tools in Kali Linux, many of which are used by military organizations and forensic investigators worldwide.

主站蜘蛛池模板: 大石桥市| 翼城县| 河曲县| 临沭县| 曲沃县| 岑溪市| 鹤岗市| 墨玉县| 北票市| 镇远县| 克东县| 鸡泽县| 上栗县| 大邑县| 靖州| 东丰县| 滕州市| 黑水县| 名山县| 曲松县| 横山县| 沙雅县| 陕西省| 德令哈市| 建水县| 工布江达县| 荣成市| 建阳市| 牙克石市| 利辛县| 万安县| 富裕县| 花莲市| 通道| 河源市| 金寨县| 叶城县| 东至县| 安国市| 赤峰市| 雅江县|