Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- List of Books for everyone that is interested on Digital Forensics
- • Mastering Python Forensics
- • Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime
- Suspects
- • The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
- • Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
- • Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software
- • Guide to Computer Forensics and Investigations (with DVD) (MindTap Course List)
- • Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security
- • EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide
- • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
- • Computer Forensics For Dummies
- • The Art of Computer Virus Research and Defense (Symantec Press)
- • Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
- • Operating System Forensics
- • Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology
- • Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 3rd Edition
- • Computer Forensics and Digital Investigation with EnCase Forensic v7
- • Kali Linux Revealed: Mastering the Penetration Testing Distribution
- • Android Forensics: Investigation, Analysis and Mobile Security for Google Android
- • Applied Network Security Monitoring: Collection, Detection, and Analysis
- • Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
- • Cloud Storage Forensics
- • Computer Forensics InfoSec Pro Guide
- • Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
- • Digital Forensics Explained
- • Digital Forensics with Open Source Tools
- • File System Forensic Analysis
- • Forensic Discovery
- • Incident Response & Computer Forensics, Third Edition
- • Investigating Child Exploitation and Pornography: The Internet, Law and Forensic Science
- • Learning Android Forensics
- • Practical Mobile Forensics - Second Edition
- • Learning iOS Forensics
- • Linux Forensics
- • Mac OS X and iOS Internals: To the Apple's Core
- • Malware Forensics: Investigating and Analyzing Malicious Code
- • Mastering Regular Expressions
- • Mastering Windows Network Forensics and Investigation
- • Network Forensics: Tracking Hackers through Cyberspace
- • Practical Mobile Forensics
- • Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
- • Real Digital Forensics: Computer Security and Incident Response
- • Rtfm: Red Team Field Manual
- • SQL Server Forensic Analysis
- • The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
- • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
- • Windows Forensic Analysis Toolkit, Fourth Edition: Advanced Analysis Techniques for Windows 8
- • Windows Internals, Part 1 (6th Edition) (Developer Reference)
- • Windows® Internals, Part 2: Covering Windows Server® 2008 R2 and Windows 7 (Windows Internals) 6th (sixth) Edition by
- Russinovich, Mark E., Solomon, David A., Ionescu, Alex [2012]
- • Windows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition)
- • Windows Sysinternals Administrator's Reference
- • Wireshark 101: Essential Skills for Network Analysis (Wireshark Solutions)
- • Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide
- • Threat Modeling: Designing for Security
- • Kali Linux 2: Penetration testing for beginners
- • Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
- • Multimedia Security: Watermarking, Steganography, and Forensics
- • Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
- • Psychological and Behavioral Examinations in Cyber Security (Advances in Digital Crime, Forensics, and Cyber
- Terrorism)
- • Social Media Investigation for Law Enforcement (Forensic Studies for Criminal Justice)
- • System Forensics, Investigation, and Response (Information
- • SQLite Forensics
- • Combating Security Breaches and Criminal Activity in the Digital Sphere (Advances in Digital Crime, Forensics, and
- Cyber Terrorism)
- • Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging (SpringerBriefs on Cyber Security
- Systems and Networks)
- • Certified Digital Forensics Examiner: Prep Guide
- • Digital and Document Examination (Advanced Forensic Science Series)
- • Digital Archaeology: The Art and Science of Digital Forensics
- • Digital Forensic Diaries
- • Digital Forensic Evidence Examination
- • Digital Forensics for Handheld Devices
- • Forensic Analysis of Digital Image Tampering
- • Email Forensics: Eliminating Spam, Scams and Phishing
- • Forensic Examination of Digital Evidence: A Guide for Law Enforcement
- • Forensic Digital Image Processing: Optimization of Impression Evidence
- • Forensic Examination of Windows-Supported File Systems
- • Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations
- • Learning Python for Forensics
- • Python Digital Forensics Cookbook: Effective Python recipes for digital investigations
- • Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
- • Anti-Hacker Tool Kit, Third Edition
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement