

Hero image 0 of Practical Linux Forensics : A Guide for Digital Investigators (Paperback), 0 of 2
Practical Linux Forensics : A Guide for Digital Investigators (Paperback)
(No ratings yet)
Key item features
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.
Learn how to:
Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.
Learn how to:
Specs
- Book formatPaperback
- Fiction/nonfictionNon-Fiction
- GenreComputing & Internet
- Pages400
- Reading levelGeneral
- SubgenreComputers
Current price is USD$40.49
Price when purchased online
- Free shipping
Free 90-day returns
How do you want your item?
Try 30 days of Free Shipping with Walmart+! Choose plan at checkout.
Columbus, 43215
Arrives by Mon, Apr 20
Sold and shipped by Walmart.com
Free 90-day returns
This item is gift eligible
More seller options (1)
Starting from $44.33
Get free delivery, shipping and more*
*Restrictions apply Try Walmart+ now
About this item
Product details
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack. Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You'll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used. Learn how to: Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.
Learn how to:
Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.
Learn how to:
info:
We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here, and we have not verified it. Â
Specifications
Book format
Paperback
Fiction/nonfiction
Non-Fiction
Genre
Computing & Internet
Pages
400
Warranty
Warranty information
Please be aware that the warranty terms on items offered for sale by third party Marketplace sellers may differ from those displayed in this section (if any). To confirm warranty terms on an item offered for sale by a third party Marketplace seller, please use the 'Contact seller' feature on the third party Marketplace seller's information page and request the item's warranty terms prior to purchase.
Similar items you might like
Based on what customers bought
Forensic Psychology for Dummies, (Paperback) $13.59 Was $24.99
$1359current price $13.59, Was $24.99$24.99Forensic Psychology for Dummies, (Paperback)
Cybercrime Investigations: A Comprehensive Resource for Everyone, (Paperback) $40.22
$4022current price $40.22Cybercrime Investigations: A Comprehensive Resource for Everyone, (Paperback)
Pre-Owned A Practical Guide to Digital Forensics Investigations (Paperback) 0789759918 9780789759917 $38.76
$3876current price $38.76Pre-Owned A Practical Guide to Digital Forensics Investigations (Paperback) 0789759918 9780789759917
Fundamentals of Interviewing and Interrogation, (Paperback) $41.47
$4147current price $41.47Fundamentals of Interviewing and Interrogation, (Paperback)
Cyber Crime Investigator's Field Guide, (Paperback) $63.99
$6399current price $63.99Cyber Crime Investigator's Field Guide, (Paperback)
Practical Handbook for Professional Investigators, (Paperback) $60.00
$6000current price $60.00Practical Handbook for Professional Investigators, (Paperback)
Pre-Owned Professional Issues in Forensic Science (Hardcover) by Max M Houck $42.31
3 optionsAvailable in additional 3 options$4231current price $42.31Pre-Owned Professional Issues in Forensic Science (Hardcover) by Max M Houck
Pre-Owned Cybercrime and Digital Forensics: An Introduction (Paperback) 0367360071 9780367360078 $25.24
2 optionsAvailable in additional 2 options$2524current price $25.24Pre-Owned Cybercrime and Digital Forensics: An Introduction (Paperback) 0367360071 9780367360078
Audio Engineering Society Presents Digital Audio Forensics Fundamentals: From Capture to Courtroom, (Paperback) $62.72
$6272current price $62.72Audio Engineering Society Presents Digital Audio Forensics Fundamentals: From Capture to Courtroom, (Paperback)
Précis De Médecine Légale (Paperback) $36.73
$3673current price $36.73Précis De Médecine Légale (Paperback)
The Medical Examiner's Manual, (Hardcover) $30.10
$3010current price $30.10The Medical Examiner's Manual, (Hardcover)
Essential Forensic Biology, (Paperback) $59.76
$5976current price $59.76Essential Forensic Biology, (Paperback)
Creating Digital Faces for Law Enforcement, (Paperback) $45.47
$4547current price $45.47Creating Digital Faces for Law Enforcement, (Paperback)
Cybercrime and Digital Forensics: An Introduction, (Paperback) $35.19
$3519current price $35.19Cybercrime and Digital Forensics: An Introduction, (Paperback)
Integrating Python with Leading Computer Forensics Platforms, (Paperback) $69.29
$6929current price $69.29Integrating Python with Leading Computer Forensics Platforms, (Paperback)
Cyber Forensics (Paperback) $35.00
$3500current price $35.00Cyber Forensics (Paperback)
Investigator and Fraud Fighter Guidebook, (Hardcover) $39.99
$3999current price $39.99Investigator and Fraud Fighter Guidebook, (Hardcover)
Pre-Owned Cybercrime and Digital Forensics: An Introduction (Paperback) 1138238732 9781138238732 $8.64 Was $9.74
2 optionsAvailable in additional 2 options$864current price $8.64, Was $9.74$9.74Pre-Owned Cybercrime and Digital Forensics: An Introduction (Paperback) 1138238732 9781138238732
Professional Policing Curriculum in Prac Major and Serious Crime Investigations, (Paperback) $30.39
$3039current price $30.39Professional Policing Curriculum in Prac Major and Serious Crime Investigations, (Paperback)
Customer ratings & reviews
0 ratings|0 reviews
This item does not have any reviews yet

