EasterBlack-owned or founded brands at TargetGroceryClothing, Shoes & AccessoriesBabyHomeFurnitureKitchen & DiningOutdoor Living & GardenToysElectronicsVideo GamesMovies, Music & BooksSports & OutdoorsBeautyPersonal CareHealthPetsHousehold EssentialsArts, Crafts & SewingSchool & Office SuppliesParty SuppliesLuggageGift IdeasGift CardsClearanceTarget New ArrivalsTarget Finds#TargetStyleTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores

Sponsored

Digital Forensics Basics - by Nihad A Hassan (Paperback)

Digital Forensics Basics - by  Nihad A Hassan (Paperback) - 1 of 1
$54.99 when purchased online
Target Online store #3991

About this item

Highlights

  • Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system.
  • About the Author: Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author.
  • 335 Pages
  • Computers + Internet, Security

Description



Book Synopsis



Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law.

Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use.

Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills.


What You'll Learn

  • Assemble computer forensics lab requirements, including workstations, tools, and more
  • Document the digital crime scene, including preparing a sample chain of custody form
  • Differentiate between law enforcement agency and corporate investigations
  • Gather intelligence using OSINT sources
  • Acquire and analyze digital evidence
  • Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics
  • Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques


Who This Book Is For

Police and other law enforcement personnel, judges(with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals



From the Back Cover



Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law.

Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use.

Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills.

What You'll Learn:

  • Assemble computer forensics lab requirements, including workstations, tools, and more
  • Document the digital crime scene, including preparing a sample chain of custody form
  • Differentiate between law enforcement agency and corporate investigations
  • Gather intelligence using OSINT sources
  • Acquire and analyze digital evidence
  • Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics
  • Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques



About the Author



Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research on different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. He has completed several technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and cyber open source intelligence (OSINT). Nihad has authored five books and scores of information security articles for various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and cyber OSINT. He covers different information security topics and related matters on his security blog (DarknessGate) and recently launched a dedicated site for open source intelligence resources at (OSINT.link). Nihad has a bachelor of science honors degree in computer science from the University of Greenwich in the United Kingdom. He can be followed on Twitter (@DarknessGate), and you can connect to him via LinkedIn (DarkenessGate).


Dimensions (Overall): 10.0 Inches (H) x 7.0 Inches (W) x .75 Inches (D)
Weight: 1.37 Pounds
Suggested Age: 22 Years and Up
Sub-Genre: Security
Genre: Computers + Internet
Number of Pages: 335
Publisher: Apress
Theme: General
Format: Paperback
Author: Nihad A Hassan
Language: English
Street Date: February 26, 2019
TCIN: 1003039870
UPC: 9781484238370
Item Number (DPCI): 247-46-9770
Origin: Made in the USA or Imported
If the item details above aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.75 inches length x 7 inches width x 10 inches height
Estimated ship weight: 1.37 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
See the return policy for complete information.

Related Categories

Get top deals, latest trends, and more.

Privacy policy

Footer

About Us

About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

Help

Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member Services

Stores

Find a StoreClinicPharmacyOpticalMore In-Store Services

Services

Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy