Difference between revisions of "Books and Courses"

From SleuthKitWiki
Jump to: navigation, search
m (Books On TSK moved to Documents on Using TSK: Moved to more general topic)
(Books)
 
(11 intermediate revisions by 2 users not shown)
Line 1: Line 1:
= Books with TSK=  
+
This page contains links to resources that are not on the web and/or are not free that mention TSK and/or Autopsy.  Resources on the web can be found in [[Help Documents]] or [[Autopsy User's Guide]].
 +
 
 +
= Books =  
 
(in alphabetical order)
 
(in alphabetical order)
 
* [http://computer-forensik.org/ Computer Forensik 2nd Edition]. Alexander Geschonneck. German Language. 2006. dpunkt.
 
* [http://computer-forensik.org/ Computer Forensik 2nd Edition]. Alexander Geschonneck. German Language. 2006. dpunkt.
Line 6: Line 8:
 
* [http://www.aw-bc.com/catalog/academic/product/0,1144,020163497X,00.html Forensic Discovery]. Dan Farmer and Wietse Venema. 2005. Addison Wesley.
 
* [http://www.aw-bc.com/catalog/academic/product/0,1144,020163497X,00.html Forensic Discovery]. Dan Farmer and Wietse Venema. 2005. Addison Wesley.
 
* [http://books.mcgraw-hill.com/getbook.php?isbn=007222696X Incident Response and Computer Forensics 2nd Edition]. Mandia, Prosise, Pepe. 2003. Osborne.
 
* [http://books.mcgraw-hill.com/getbook.php?isbn=007222696X Incident Response and Computer Forensics 2nd Edition]. Mandia, Prosise, Pepe. 2003. Osborne.
 +
* [http://www.os-t.de/buecher_new.php Intrusion Detection und Prevention mit Snort & Co.]. Ralf Spenneberg. German Language. 2006. Addison Wesley.
 
* [http://www.honeynet.org/book/index.html Know Your Enemy 2nd Edition]. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley.
 
* [http://www.honeynet.org/book/index.html Know Your Enemy 2nd Edition]. The Honeynet Project (Brian Carrier wrote the UNIX Forensics chapter and Rob Lee wrote the Windows Forensics chapter). 2004. Addison Wesley.
 
* [http://www.phptr.com/bookstore/product.asp?isbn=0131014056&rl=1 Malware: Fighting Malicious Code]. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall.
 
* [http://www.phptr.com/bookstore/product.asp?isbn=0131014056&rl=1 Malware: Fighting Malicious Code]. Ed Skoudis with Lenny Zeltser. 2004. Prentice Hall.
Line 11: Line 14:
 
* [http://www.oreilly.com/catalog/swarrior/index.html Security Warrior]. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly.
 
* [http://www.oreilly.com/catalog/swarrior/index.html Security Warrior]. Cyrus Peikari and Anton Chuvakin. 2004. O'Reilly.
  
= Articles with TSK=
+
=Training Courses=
* [ftp://ftp.hq.nasa.gov/pub/ig/ccd/linuxintro/ Law Enforcement and Forensic Examiner Introduction to Linux: A Beginner's Guide]. Barry Grundy. 2003. NASA.
+
* [http://www.giac.org/ GIAC Reports] - Look at the reports that people submitted for their GIAC certification. There are quite a few if you search for 'sleuth' or 'autopsy'.
+
 
+
=Training Courses with TSK=
+
 
(in alphabetical order)
 
(in alphabetical order)
 
* [http://www.sans.org/ SANS Forensics Track (Track #8)] (ongoing)
 
* [http://www.sans.org/ SANS Forensics Track (Track #8)] (ongoing)
 +
* [http://www.dflabs.com/training.php DFLabs, Computer Forensics Analysis with TSK and PTK, Base and Advanced] (ongoing)

Latest revision as of 08:18, 16 October 2008

This page contains links to resources that are not on the web and/or are not free that mention TSK and/or Autopsy. Resources on the web can be found in Help Documents or Autopsy User's Guide.

Books

(in alphabetical order)

Training Courses

(in alphabetical order)