Digital Forensics


File System Forensic Analysis
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Windows Forensic Analysis: DVD Toolkit
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
Guide to Computer Forensics and Investigations (Book & CD)
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7
Digital Forensics with Open Source Tools
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Handbook of Digital Forensics and Investigation
Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology
Real Digital Forensics: Computer Security and Incident Response
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
The word “hacker” has two very different meanings. The people I knew who called themselves hackers were software wizards who managed to creatively program themselves out of tight corners. They knew all the nooks and crannies of the operating system. Not dull software engineers who put in forty hours a week, but creative programmers who can’t leave the computer until the machine’s satisfied. A hacker identifies with the computer, knowing it like a friend.
Cliff Stoll, The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage

Digital Forensics & Incident Response (DFIR) Discussions of DFIR/cybercrime books and writing of these books and topics in both fiction and n…more
16 members, last active 8 years ago