官术网_书友最值得收藏!

Preface

In today's world, new threats, breaches, and malicious activities are discovered and published in the news, websites, and portals quite regularly. As much as we try to secure our data, systems, and networks to the best of our abilities, breaches occur. In an effort to understand what took place, we turn to the field of digital forensics. Although still a relatively new field, forensics has become just as important as security, especially when considering the wealth of information available to anyone accessing the internet with the intent of carrying out malicious activity. Thankfully, digital fingerprints and artifacts are sometimes left behind, whether in a deleted or hidden file, email, in someone's browsing history, remote connection list, or even mobile text message.

This book gives even the absolute beginner a structured approach with best practices to carry out their own investigations using the popular and powerful forensics tools in Kali Linux, many of which are used by military organizations and forensic investigators worldwide.

主站蜘蛛池模板: 运城市| 永靖县| 黄山市| 西乡县| 桐柏县| 武川县| 奉节县| 娄烦县| 亳州市| 进贤县| 荣昌县| 阳山县| 秭归县| 监利县| 铅山县| 曲沃县| 建昌县| 峡江县| 昆明市| 林周县| 始兴县| 乌什县| 吉安县| 香河县| 蓝山县| 馆陶县| 汝南县| 贺兰县| 麻阳| 天祝| 高阳县| 广德县| 平定县| 西青区| 柳林县| 昌乐县| 建昌县| 琼海市| 达拉特旗| 阳江市| 信丰县|