Difference between revisions of "Books and Courses"
From SleuthKitWiki
(→Training Courses) |
(→Books) |
||
(2 intermediate revisions by one user not shown) | |||
Line 8: | Line 8: | ||
* [http://www.aw-bc.com/catalog/academic/product/0,1144,020163497X,00.html Forensic Discovery]. Dan Farmer and Wietse Venema. 2005. Addison Wesley. | * [http://www.aw-bc.com/catalog/academic/product/0,1144,020163497X,00.html Forensic Discovery]. Dan Farmer and Wietse Venema. 2005. Addison Wesley. | ||
* [http://books.mcgraw-hill.com/getbook.php?isbn=007222696X Incident Response and Computer Forensics 2nd Edition]. Mandia, Prosise, Pepe. 2003. Osborne. | * [http://books.mcgraw-hill.com/getbook.php?isbn=007222696X Incident Response and Computer Forensics 2nd Edition]. Mandia, Prosise, Pepe. 2003. Osborne. | ||
+ | * [http://www.os-t.de/buecher_new.php Intrusion Detection und Prevention mit Snort & Co.]. Ralf Spenneberg. German Language. 2006. Addison Wesley. | ||
* [http://www.honeynet.org/book/index.html Know Your Enemy 2nd Edition]. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley. | * [http://www.honeynet.org/book/index.html Know Your Enemy 2nd Edition]. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley. | ||
* [http://www.phptr.com/bookstore/product.asp?isbn=0131014056&rl=1 Malware: Fighting Malicious Code]. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall. | * [http://www.phptr.com/bookstore/product.asp?isbn=0131014056&rl=1 Malware: Fighting Malicious Code]. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall. | ||
* [http://www.realdigitalforensics.com/ Real Digital Forensics]. Keith Jones, Richard Bejtlich, and Curtis Rose. 2005. Addison Wesley. | * [http://www.realdigitalforensics.com/ Real Digital Forensics]. Keith Jones, Richard Bejtlich, and Curtis Rose. 2005. Addison Wesley. | ||
* [http://www.oreilly.com/catalog/swarrior/index.html Security Warrior]. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly. | * [http://www.oreilly.com/catalog/swarrior/index.html Security Warrior]. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly. | ||
− | |||
=Training Courses= | =Training Courses= | ||
(in alphabetical order) | (in alphabetical order) | ||
* [http://www.sans.org/ SANS Forensics Track (Track #8)] (ongoing) | * [http://www.sans.org/ SANS Forensics Track (Track #8)] (ongoing) | ||
− | * [http://www.dflabs.com/training.php DFLabs, Computer Forensics Analysis, Base and Advanced] (ongoing) | + | * [http://www.dflabs.com/training.php DFLabs, Computer Forensics Analysis with TSK and PTK, Base and Advanced] (ongoing) |
Latest revision as of 08:18, 16 October 2008
This page contains links to resources that are not on the web and/or are not free that mention TSK and/or Autopsy. Resources on the web can be found in Help Documents or Autopsy User's Guide.
Books
(in alphabetical order)
- Computer Forensik 2nd Edition. Alexander Geschonneck. German Language. 2006. dpunkt.
- Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet 2nd Edition. Eoghan Casey. 2004. Elsevier.
- File System Forensic Analysis. Brian Carrier. 2005. Addison Wesley.
- Forensic Discovery. Dan Farmer and Wietse Venema. 2005. Addison Wesley.
- Incident Response and Computer Forensics 2nd Edition. Mandia, Prosise, Pepe. 2003. Osborne.
- Intrusion Detection und Prevention mit Snort & Co.. Ralf Spenneberg. German Language. 2006. Addison Wesley.
- Know Your Enemy 2nd Edition. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley.
- Malware: Fighting Malicious Code. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall.
- Real Digital Forensics. Keith Jones, Richard Bejtlich, and Curtis Rose. 2005. Addison Wesley.
- Security Warrior. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly.
Training Courses
(in alphabetical order)