Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Guide to digital forensics : a concise and practical introduction
Kävrestad J., Springer International Publishing, New York, NY, 2017. 147 pp. Type: Book (978-3-319674-49-0)
Date Reviewed: Apr 5 2018

Guide to digital forensics is designed as a 145-page introductory textbook or an overview for practitioners. The author is Swedish, but the concepts are universal.

The topic is logically developed in four sections: “Theory,” “Put It to Practice,” “Vocabulary,” and “Appendices” (of problem solutions, useful scripts, a sample report template, time zones, and a Jitsi chat log). “Theory” is divided into chapters discussing “What Is Digital Forensics?”; “What Is Cybercrime?”; “Computer Theory”; “Collecting Evidence”; and “Analyzing Data and Writing Reports.” The section on practice includes chapters concerning “Collecting Data”; “Indexing, Searching, and Cracking”; “Finding Artifacts”; “Some Common Questions”; “FTK Specifics”; and “Basic Memory Analysis.”

The scripts indicate how to capture basic computer information on Mac, Linux, and Windows, and how to parse Jitsi chat logs. These could be modified or expanded for more advanced work. Common questions are discussed: Was the computer remote controlled? Who was using the computer? Was this device ever at site X?

Each chapter begins with an abstract and a list of keywords and concludes with questions and tasks and a list of references. Where appropriate, figures, diagrams, and flowcharts are included. Chapters average about 12 pages in length, with each chapter broken into subsections for easy searching in the table of contents.

The short length provides a very good introduction to digital forensics without bogging the reader down in excessive detail and in-depth discussions. It is well written and worthy of your attention.

Reviewer:  Brad Reid Review #: CR145954 (1806-0306)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy