Difference between revisions of "Books and Courses"
From SleuthKitWiki
Line 1: | Line 1: | ||
− | = | + | = Books with TSK= |
(in alphabetical order) | (in alphabetical order) | ||
* [http://computer-forensik.org/ Computer Forensik 2nd Edition]. Alexander Geschonneck. German Language. 2006. dpunkt. | * [http://computer-forensik.org/ Computer Forensik 2nd Edition]. Alexander Geschonneck. German Language. 2006. dpunkt. | ||
Line 11: | Line 11: | ||
* [http://www.oreilly.com/catalog/swarrior/index.html Security Warrior]. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly. | * [http://www.oreilly.com/catalog/swarrior/index.html Security Warrior]. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly. | ||
− | = | + | = Articles with TSK= |
* [ftp://ftp.hq.nasa.gov/pub/ig/ccd/linuxintro/ Law Enforcement and Forensic Examiner Introduction to Linux: A Beginner's Guide]. Barry Grundy. 2003. NASA. | * [ftp://ftp.hq.nasa.gov/pub/ig/ccd/linuxintro/ Law Enforcement and Forensic Examiner Introduction to Linux: A Beginner's Guide]. Barry Grundy. 2003. NASA. | ||
* [http://www.giac.org/ GIAC Reports] - Look at the reports that people submitted for their GIAC certification. There are quite a few if you search for 'sleuth' or 'autopsy'. | * [http://www.giac.org/ GIAC Reports] - Look at the reports that people submitted for their GIAC certification. There are quite a few if you search for 'sleuth' or 'autopsy'. | ||
− | = | + | =Training Courses with TSK= |
(in alphabetical order) | (in alphabetical order) | ||
* [http://www.sans.org/ SANS Forensics Track (Track #8)] (ongoing) | * [http://www.sans.org/ SANS Forensics Track (Track #8)] (ongoing) |
Revision as of 05:44, 26 December 2007
Books with TSK
(in alphabetical order)
- Computer Forensik 2nd Edition. Alexander Geschonneck. German Language. 2006. dpunkt.
- Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet 2nd Edition. Eoghan Casey. 2004. Elsevier.
- File System Forensic Analysis. Brian Carrier. 2005. Addison Wesley.
- Forensic Discovery. Dan Farmer and Wietse Venema. 2005. Addison Wesley.
- Incident Response and Computer Forensics 2nd Edition. Mandia, Prosise, Pepe. 2003. Osborne.
- Know Your Enemy 2nd Edition. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley.
- Malware: Fighting Malicious Code. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall.
- Real Digital Forensics. Keith Jones, Richard Bejtlich, and Curtis Rose. 2005. Addison Wesley.
- Security Warrior. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly.
Articles with TSK
- Law Enforcement and Forensic Examiner Introduction to Linux: A Beginner's Guide. Barry Grundy. 2003. NASA.
- GIAC Reports - Look at the reports that people submitted for their GIAC certification. There are quite a few if you search for 'sleuth' or 'autopsy'.
Training Courses with TSK
(in alphabetical order)
- SANS Forensics Track (Track #8) (ongoing)