Difference between revisions of "Books and Courses"
From SleuthKitWiki
(New page: = Known Documents / Books with The Sleuth Kit= * Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet 2nd Edition. Eoghan Casey. 2004. Elsevier. * File Syst...) |
|||
Line 1: | Line 1: | ||
= Known Documents / Books with The Sleuth Kit= | = Known Documents / Books with The Sleuth Kit= | ||
− | * Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet 2nd Edition. Eoghan Casey. 2004. Elsevier. | + | * [http://www.corpus-delicti.com/fs_bookstore/decc/ Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet 2nd Edition]. Eoghan Casey. 2004. Elsevier. |
− | * File System Forensic Analysis. Brian Carrier. 2005. Addison Wesley. | + | * [http://www.digital-evidence.org/fsfa/ File System Forensic Analysis]. Brian Carrier. 2005. Addison Wesley. |
− | * Forensic Discovery. Dan Farmer and Wietse Venema. 2005. Addison Wesley. | + | * [http://www.aw-bc.com/catalog/academic/product/0,1144,020163497X,00.html Forensic Discovery]. Dan Farmer and Wietse Venema. 2005. Addison Wesley. |
− | * Law Enforcement and Forensic Examiner Introduction to Linux: A Beginner's Guide . Barry Grundy. 2003. NASA. | + | * [ftp://ftp.hq.nasa.gov/pub/ig/ccd/linuxintro/ Law Enforcement and Forensic Examiner Introduction to Linux: A Beginner's Guide]. Barry Grundy. 2003. NASA. |
− | * Incident Response and Computer Forensics 2nd Edition. Mandia, Prosise, Pepe. 2003. Osborne. | + | * [http://books.mcgraw-hill.com/getbook.php?isbn=007222696X Incident Response and Computer Forensics 2nd Edition]. Mandia, Prosise, Pepe. 2003. Osborne. |
− | * Know Your Enemy 2nd Edition. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley. | + | * [http://www.honeynet.org/book/index.html Know Your Enemy 2nd Edition]. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley. |
− | * Malware: Fighting Malicious Code. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall. | + | * [http://www.phptr.com/bookstore/product.asp?isbn=0131014056&rl=1 Malware: Fighting Malicious Code]. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall. |
− | * Real Digital Forensics. Keith Jones, Richard Bejtlich, and Curtis Rose. 2005. Addison Wesley. | + | * [http://www.realdigitalforensics.com/ Real Digital Forensics]. Keith Jones, Richard Bejtlich, and Curtis Rose. 2005. Addison Wesley. |
− | * Security Warrior. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly. | + | * [http://www.oreilly.com/catalog/swarrior/index.html Security Warrior]. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly. |
− | * GIAC Reports - Look at the reports that people submitted for their GIAC certification. There are quite a few if you search for 'sleuth' or 'autopsy'. | + | * [http://www.giac.org/ GIAC Reports] - Look at the reports that people submitted for their GIAC certification. There are quite a few if you search for 'sleuth' or 'autopsy'. |
Revision as of 18:23, 4 June 2007
Known Documents / Books with The Sleuth Kit
- Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet 2nd Edition. Eoghan Casey. 2004. Elsevier.
- File System Forensic Analysis. Brian Carrier. 2005. Addison Wesley.
- Forensic Discovery. Dan Farmer and Wietse Venema. 2005. Addison Wesley.
- Law Enforcement and Forensic Examiner Introduction to Linux: A Beginner's Guide. Barry Grundy. 2003. NASA.
- Incident Response and Computer Forensics 2nd Edition. Mandia, Prosise, Pepe. 2003. Osborne.
- Know Your Enemy 2nd Edition. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley.
- Malware: Fighting Malicious Code. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall.
- Real Digital Forensics. Keith Jones, Richard Bejtlich, and Curtis Rose. 2005. Addison Wesley.
- Security Warrior. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly.
- GIAC Reports - Look at the reports that people submitted for their GIAC certification. There are quite a few if you search for 'sleuth' or 'autopsy'.