0% found this document useful (0 votes)
80 views3 pages

DigitalForensic Flyer

This document provides an overview of a book on digital forensics. The book covers topics such as disk forensics, network forensics, memory forensics, and investigating Windows and UNIX systems. It includes lab experiments and practice questions. The book is intended for students and practitioners in the field of digital forensics.

Uploaded by

cmpn.20102a0032
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views3 pages

DigitalForensic Flyer

This document provides an overview of a book on digital forensics. The book covers topics such as disk forensics, network forensics, memory forensics, and investigating Windows and UNIX systems. It includes lab experiments and practice questions. The book is intended for students and practitioners in the field of digital forensics.

Uploaded by

cmpn.20102a0032
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/374155922

Digital Forensic

Book · September 2023

CITATIONS READS

0 837

1 author:

Nilakshi Jain
Shah And Anchor Kutchhi Engineering College
58 PUBLICATIONS 321 CITATIONS

SEE PROFILE

All content following this page was uploaded by Nilakshi Jain on 25 September 2023.

The user has requested enhancement of the downloaded file.


As per syllabus of Mumbai University

Digital Forensic
ABOUT THE AUTHORS
Dr. Nilakshi Jain is Associate Professor (IT) at Shah & Anchor Kutchhi Engineering College, Mumbai. She is a
Certified Ethical Hacker CEH (EC-Council-USA). She has a rich experience of working in Digital Forensic field. Her
areas of research include Artificial Intelligence, Human Computer Interaction and Usability Engineering. Her first
edition of Digital Forensic: The Fascinating World of Digital Evidences (Wiley) has been recommended as text book in
various esteemed universities, including Indian Institute of Technology (IIT).
Dr. Dhananjay R. Kalbande is Professor & Head, Computer Engineering and Dean (Industry Relations), Sardar
Patel Institute of Technology, Andheri (West), Mumbai, India. He is the Founder and CEO of Skinzy Software
Solutions Pvt. Ltd., a healthcare startup for skin disease diagnosis. He has over 19+ years of experience in teaching
and research. His areas of research are Digital Forensic, Soft Computing, Human Computing Interaction, Mobile
Device Applications, Decision making to name a few.

ABOUT THE BOOK


This book is ideal for those who desire to learn more about investigating and fighting digital crimes. It is also highly
beneficial to computer professionals who are intending to move into the rapidly growing security field and
considering to shift their career focus to law enforcement and criminal investigation. This book covers latest
challenges faced in the digital forensic world and sequentially explains disk forensic, network forensic, and
memory forensic.

KEY FEATURES

} Covers challenges faced in digital


forensic.

} Includes Lab experiments (Appendix


A) based on important topics of the
book as per MU syllabus.

} Contains important Questions and


Answers with solutions (Appendix B).

} Chapter-wise PowerPoint
Presentations (PPTs) are available for
instructors.

} Beneficial for IT students in addition


to new and experienced digital
forensic practitioners.

ISBN: 9788126578399 | Pages: 320 | ` 429


Table of Contents
1. Introduction to Computer Crimes 3.5 Activities in Initial Response 7.2 Investigating Windows Systems
and Ethical Hacking 3.6 Phases after Detection of an 7.3 Investigating UNIX Systems
Learning Objectives Incident 7.4 Investigating Applications
1.1 Introduction to Cybercrime 7.5 Malware Handling
4. Live Data Collection
1.2 Categories of Cybercrimes
Learning Objectives 8. Network Forensic
1.3 Types of Cybercrimes
4.1 Introduction Learning Objectives
1.4 The Internet Spawns Crime
4.2 The Facts in a Criminal Case 8.1 Introduction to Network Forensic
1.5 Worms Versus Viruses
4.3 People Involved in Data Collection 8.2 Understanding Password Cracking
1.6 Computer's Role in Crimes Techniques
1.7 Cybercrime Statistics in India 8.3 Understanding Technical Exploits
4.4 Live Data Collection
1.8 Prevention of Cybercrime 8.4 Introduction to Intrusion Detection
4.5 Live Data collection from UNIX System
1.9 Definition of Hacker System
8.5 Types of Intrusion Detection System
1.10 Definition of Crackers
5. Forensic Duplication 8.6 Understanding Network Intrusions
1.11 Definition of Phreakers and Attacks
Learning Objectives
1.12 Ethical Hacking 8.7 Analyzing Network Traffic
5.1 Introduction to Forensic Duplication
1.13 Difference between Hacking and 8.8 Collecting Network-Based Evidence
Ethical Hacking 5.2 Rules of Forensic Duplication
(Thumb Rule) 8.9 Evidence Handling
1.14 Steps of Ethical Hacking
5.3 Necessity of Forensic Duplication 8.10 Investigating Routers
1.15 Exploring Some Tools for Ethical
Hacking 5.4 Forensic Duplicates as Admissible 8.11 Handling Router Table Manipulation
Evidence Incidents
1.16 What to Do if Been Hacked?
5.5 Important Terms in Forensic 8.12 Using Routers as Response Tools
2. Introduction to Digital Forensics Duplicate
and Digital Evidences 5.6 Forensic Image Formats 9. Report Writing
Learning Objectives 5.7 Traditional Duplication Learning Objectives
2.1 Introduction to Digital Forensic 5.8 Live System Duplication 9.1 Goals of Report
2.2 Need of Digital Forensic 5.9 Forensic Duplication Tool 9.2 Layout of an Investigative Report
2.3 Rules of Computer/Digital Forensic Requirements 9.3 Guidelines for Writing a Report
2.4 Types of Digital Forensics 5.10 Creating a Forensic Duplicate of a 9.4 Sample for Writing a Report
Hard Drive
2.5 Ethical Issues 10. Computer Forensics Tools
5.11 Creating a Qualified Forensic
2.6 Digital Forensic Investigations Learning Objectives
Duplicate of a Hard Drive
2.7 Introduction to Digital Evidences 10.1 Introduction to Computer Forensic
2.8 Rules of Digital Evidence 6. Disk and File System Analysis Tools
2.9 Characteristics of Digital evidence Learning Objectives 10.2 Needs of Computer Forensics Tool
2.10 Types of Evidence 6.1 Media Analysis Concepts 10.3 Types of Computer Forensics Tools
2.11 Challenges in Evidence Handling 6.2 Partitioning and Disk Layouts 10.4 Tasks Performed by Computer
6.3 Special Containers Forensics Tools
3. Incidence Response Process
6.4 Hashing 10.5 Study of Digital Forensic Tools
Learning Objectives
6.5 Carving
3.1 Introduction Further Readings
6.6 Forensic Imaging
3.2 People Involved in Incident Appendix A: Lab Experiments
Response Process 7. Data Analysis Appendix B: Questions and Answers
3.3 Incident Response Process Learning Objectives
3.4 Incident Response Methodology 7.1 Preparation Steps for Forensic
Analysis

Wiley India Pvt. Ltd.


HEADOFFICE:1402, 14th Floor, World Trade Tower, Plot No. C-1, Sector-16, Noida 201301 INDIA
Tel.: +(91 120) 6291100
BANGALORE: Tel: 080-23132383. Telefax: 080-23124319. Email: [email protected]
MUMBAI:Tel: 022-27889263, 27889272. Telefax: 022-27889263. Email: [email protected]
www.wileyindia.com
Facebook.com/WileyIndia Linkedin.com/in/WileyIndia Twitter.com/WileyIndiaPL

View publication stats

You might also like