CVV logo
विद्यया रक्षिता संस्कृतिः सर्वदा।
संस्कृतेर्मानवाः संस्कृता भूरिदा:।।
Knowledge protects culture forever
Cultured people share abundantly.Swami Tejomayananda Founder – Chinmaya Vishwavidyapeeth
CVV logo
L I B R A R Y   O P A C

Digital Forensic: (Record no. 75180)

MARC details
000 -LEADER
fixed length control field 06345nam a22001817a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9788126565740
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25 N59 D
Item number 103929
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Nilakshi Jain
245 ## - TITLE STATEMENT
Title Digital Forensic:
Remainder of title The Fascinating World of Digital Evidences
250 ## - EDITION STATEMENT
Edition statement 1st ed
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication New Delhi
Name of publisher Wiley
Date of publication 2017
300 ## - PHYSICAL DESCRIPTION
Number of Pages 470
500 ## - GENERAL NOTE
General note This book is for those who desire to learn more about investigating and fighting digital crimes. It covers latest challenges faced in digital forensic like email forensic, mobile forensic and cloud forensic. It also sequentially explains disk forensic, network forensic, memory forensic, mobile forensic and cloud forensic. The lucid content of the book and the questions provided in each chapter help the learners to prepare themselves for digital forensic competitive exams.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Preface<br/><br/>Acknowledgements<br/><br/>About the Authors<br/><br/> <br/><br/>1 Introduction to Computer Crimes<br/><br/>1.1 Introduction to Cybercrime<br/><br/>1.2 Categories of Cybercrimes<br/><br/>1.3 Types of Cybercrimes<br/><br/>1.4 The Internet Spawns Crime<br/><br/>1.5 Worms Versus Viruses<br/><br/>1.6 Role of Computers in Crimes<br/><br/>1.7 Cybercrime Statistics in India<br/><br/>1.8 Prevention of Cybercrime<br/><br/> <br/><br/>2 Digital Forensic<br/><br/>2.1 Introduction to Digital Forensic<br/><br/>2.2 History of Forensic<br/><br/>2.3 Rules of Computer/Digital Forensic<br/><br/>2.4 Digital Forensic as a Discipline<br/><br/>2.5 Definition of Digital Forensic<br/><br/>2.6 Digital Forensic Investigations<br/><br/>2.7 Goal of Digital Forensic Investigation<br/><br/>2.8 Various DFI Process/Models/Framework<br/><br/>2.9 Ethical Issues<br/><br/> <br/><br/>3 Digital Evidences<br/><br/>3.1 Introduction<br/><br/>3.2 What is Digital Evidence?<br/><br/>3.3 Rules of Digital Evidence<br/><br/>3.4 Characteristics of Digital Evidence<br/><br/>3.5 Types of Evidence<br/><br/>3.6 Challenges in Evidence Handling<br/><br/>3.7 Volatile Evidence<br/><br/>3.8 Evidence Handling Procedures<br/><br/>3.9 Ethical Issues/Legal Principles of Digital Evidence<br/><br/>3.10 Digital Evidence and Metadata<br/><br/> <br/><br/>4 Ethical Hacking Methodology and Tools<br/><br/>4.1 Introduction<br/><br/>4.2 Types of Hackers<br/><br/>4.3 Reason for Hacking<br/><br/>4.4 Preventions from Hackers<br/><br/>4.5 Impact of Hacking<br/><br/>4.6 Steps Performed by Hackers<br/><br/>4.7 What is Ethical Hacking?<br/><br/>4.8 Who is an Ethical Hacker?<br/><br/>4.9 Ethical Issues<br/><br/>4.10 Ethical Hacking Process<br/><br/>4.11 Working of an Ethical Hacker<br/><br/>4.12 Identifying Types of Ethical Hacks<br/><br/>4.13 Different Tools for Ethical Hacking<br/><br/> <br/><br/>5 Incidence Response Process<br/><br/>5.1 Introduction<br/><br/>5.2 Goals of Incident Response<br/><br/>5.3 People Involved in Incident Response Process<br/><br/>5.4 Incident Response Methodology<br/><br/>5.5 Activities in Initial Response<br/><br/>5.6 Phases after Detection of an Incident<br/><br/> <br/><br/>6 Data Collection<br/><br/>6.1 Introduction<br/><br/>6.2 The Facts in a Criminal Case<br/><br/>6.3 People Involved in Data Collection Techniques<br/><br/>6.4 Live Data Collection<br/><br/>6.5 Live Data Collection from Windows System<br/><br/>6.6 Live Data Collection from UNIX System<br/><br/> <br/><br/>7 Forensic Duplication<br/><br/>7.1 Introduction to Forensic Duplication<br/><br/>7.2 Rules of Forensic Duplication (Thumb Rule)<br/><br/>7.3 Necessity of Forensic Duplication<br/><br/>7.4 Forensic Duplicates as Admissible Evidence<br/><br/>7.5 Important Terms in Forensic Duplicate<br/><br/>7.6 Forensic Duplication Tool Requirements<br/><br/>7.7 Creating a Forensic Duplicate of a Hard Drive<br/><br/>7.8 Creating a Qualified Forensic Duplicate of a Hard Drive<br/><br/> <br/><br/>8 File Systems<br/><br/>8.1 File Systems<br/><br/>8.2 Various Types of File Systems<br/><br/>8.3 Introduction to Storage Layers<br/><br/>8.4 Hard Disk Drive<br/><br/>8.5 Forensic Analysis of File Systems<br/><br/> <br/><br/>9 Data Analysis<br/><br/>9.1 Preparation Steps for Forensic Analysis<br/><br/>9.2 Investigating Windows Systems<br/><br/>9.3 Investigating UNIX Systems<br/><br/>9.4 Hacker Tools<br/><br/> <br/><br/>10 Network Forensic<br/><br/>10.1 Introduction to Intrusion Detection System<br/><br/>10.2 Types of Intrusion Detection System<br/><br/>10.3 Advantages and Disadvantages of IDS<br/><br/>10.4 Understanding Network Intrusions and Attacks<br/><br/>10.5 Recognizing Pre-Intrusion/Attack Activities<br/><br/>10.6 Port Scans<br/><br/>10.7 Address Spoofing<br/><br/>10.8 Attacking with Trojans, Viruses, and Worms<br/><br/>10.9 Understanding Password Cracking<br/><br/>10.10 Understanding Technical Exploits<br/><br/>10.11 Collecting Network-Based Evidence<br/><br/>10.12 Investigating Routers<br/><br/>10.13 Network Protocols<br/><br/> <br/><br/>11 Report Writing<br/><br/>11.1 Goals of Report<br/><br/>11.2 Layout of an Investigative Report<br/><br/>11.3 Guidelines for Writing a Report<br/><br/> <br/><br/>12 E-Mail Forensic<br/><br/>12.1 Introduction<br/><br/>12.2 Working of E-Mail<br/><br/>12.3 Steps in the E-Mail Communication<br/><br/>12.4 E-Mail Service Protocols<br/><br/>12.5 Internet Fraud<br/><br/>12.6 Securing Your E-Mail Account<br/><br/>12.7 IP Tracking<br/><br/>12.8 E-Mail Recovery<br/><br/>12.9 E-Mail Forensics Analysis Steps<br/><br/>12.10 E-Mail Forensic Tools<br/><br/> <br/><br/>13 Mobile Phone Forensics<br/><br/>13.1 Mobile Hacking—SMS and Call Forging<br/><br/>13.2 Mobile Phone Forensics<br/><br/>13.3 Forensic Procedures<br/><br/>13.4 CIA Triad<br/><br/>13.5 Software and Hardware Mobile Phone Tricks<br/><br/>13.6 Android Forensics<br/><br/>13.7 Mobile Forensic Tools<br/><br/> <br/><br/>14 Computer Forensics Tools<br/><br/>14.1 Introduction to Computer Forensics Tools<br/><br/>14.2 Evaluating Computer Forensics Tool Needs<br/><br/>14.3 Types of Computer Forensics Tools<br/><br/>14.4 Tasks Performed by Computer Forensics Tools<br/><br/>14.5 Tool Comparisons<br/><br/>14.6 Computer Forensics Software Tools<br/><br/>14.7 Computer Forensics Hardware Tools<br/><br/>14.8 Various Computer/Digital Forensic Tools<br/><br/> <br/><br/>15 Cyber Law<br/><br/>15.1 Introduction to Cyber Laws<br/><br/>15.2 Three Bodies of Law<br/><br/>15.3 Types of Law<br/><br/>15.4 Levels of Law<br/><br/>15.5 Understanding Criminal Culpability<br/><br/>15.6 Level and Burden of Proof<br/><br/>15.7 Laws Related to Computers<br/><br/>15.8 The Indian Penal Code (IPC), 1860<br/><br/>15.9 Code of Criminal Procedure (CrPC), 1973<br/><br/>15.10 Electronic Communication Privacy Act (ECPA)<br/><br/>15.11 Level of Culpability<br/><br/>15.12 Mapping of Cybercrime with IT Act<br/><br/> <br/><br/>16 Cloud Forensic<br/><br/>16.1 Introduction to Cloud Forensic<br/><br/>16.2 Three Dimensions of Cloud Forensic<br/><br/>16.3 Usage of Cloud Forensic<br/><br/>16.4 Challenges to Cloud Forensic<br/><br/>16.5 Opportunities<br/><br/>16.6 Impact of Cloud Computing on Digital Forensic<br/><br/>16.7 Cloud Forensic Tools<br/><br/> <br/><br/>Summary<br/><br/>Key Terms<br/><br/>Solved Questions<br/><br/>Multiple Choice Questions<br/><br/>Fill in the Blanks<br/><br/>Review Questions<br/><br/>Case Study<br/><br/>Answer Key<br/><br/>Appendix A Lab Experiments<br/><br/>Further Reading
650 ## - SUBJECT ADDED ENTRY -- TOPICAL TERM
Topical Term Computer crimes--Investigation
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Dhananjay R Kalbande
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Purchase price Full call number Barcode Date last seen Koha item type
        Ubhayabharati Ubhayabharati Computer Science 17/07/2018 519.00 363.25 N59 D 103929 103929 17/07/2018 Books
Chinmaya Vishwa Vidyapeeth©2022.All rights reserved.
Supported by FOCUZINFOTECH.