MARC details
000 -LEADER |
fixed length control field |
04028nam a2200313 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230526220425.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210824s2020 enka|||| b||| 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781838640804 |
Qualifying information |
paperback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EG-CaTKH |
Transcribing agency |
EG-CaTKH |
Language of cataloging |
eng |
Description conventions |
rda |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 SH.D 2020 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Parasram, Shiva V. N, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Digital forensics with Kali Linux : |
Remainder of title |
perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x / |
Statement of responsibility, etc. |
Shiva V. N. Parasram. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Birmingham, UK : |
Name of producer, publisher, distributor, manufacturer |
Packt Publishing, |
Date of production, publication, distribution, manufacture, or copyright notice |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xi, 327 pages : |
Other physical details |
illustrations ; |
Dimensions |
20 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction to digital forensics -- installing Kali Linux -- Understanding filesystems and storage media -- Incident response and data acquisition -- Evidence acquisition and preservation with DC3DD and Guymager -- File recovery and data carving with foremost, scalpel and bulk extractor -- Memory forensics with volatility -- Artifact Analysis -- Autopsy -- Analysis with Xplico -- Network analysis -- Other books you may enjoy. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book Description Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is for This Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered. |
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Kali Linux. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Investigation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Penetration testing (Computer security) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Malware (Computer software) |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
2022028 |