Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
£ 12.35
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.75.
Seller: Bellwetherbooks, McKeesport, PA, U.S.A.
£ 11.20
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: As New. LIKE NEW!!! Has a red or black remainder mark on bottom/exterior edge of pages.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. 209.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
£ 30.64
Convert currencyQuantity: 15 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
£ 30.71
Convert currencyQuantity: 15 available
Add to basketCondition: New.
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
£ 46.66
Convert currencyQuantity: 15 available
Add to basketCondition: New. 2021. Paperback. . . . . .
Seller: Kennys Bookstore, Olney, MD, U.S.A.
£ 54.63
Convert currencyQuantity: 15 available
Add to basketCondition: New. 2021. Paperback. . . . . . Books ship from the US and Ireland.
£ 37.22
Convert currencyQuantity: 3 available
Add to basketCondition: New. Bruce Nikkel is a professor at the Bern University of Applied Sciences in Switzerland, specializing in digital forensics and cybercrime. He is co-head of the university&rsquos research institute for cybersecurity and engineering, and director of the.
Published by Random House LLC US Dez 2021, 2021
ISBN 10: 171850196X ISBN 13: 9781718501966
Language: English
Seller: AHA-BUCH GmbH, Einbeck, Germany
£ 49.70
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware - A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.Learn how to:Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryptionInvestigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applicationsReconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical loginPerform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashesExamine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distrosPerform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux systemReconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifactsAnalyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settingsIdentify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity.
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 400 pages. 9.25x7.25x0.75 inches. In Stock.
Seller: Indiana Book Company, Marion, IN, U.S.A.
£ 10.95
Convert currencyQuantity: 1 available
Add to basketCondition: Good. Ships same or next business day with delivery confirmation. Good condition. May or may not contain highlighting. Expedited shipping available.
Seller: Big River Books, Powder Springs, GA, U.S.A.
£ 12.35
Convert currencyQuantity: 1 available
Add to basketCondition: good. This book is in good condition. The cover has minor creases or bends. The binding is tight and pages are intact. Some pages may have writing or highlighting.
Seller: Toscana Books, AUSTIN, TX, U.S.A.
£ 50.94
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks.