Practical Linux Forensics
A Guide for Digital Investigators
|Price||$44.19 - $44.49
|Publisher||No Starch Press|
|Format||Paper book / ebook (PDF)|
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems that have been misused, abused, or the target of malicious attacks. This essential practitioner's guide will show you how to locate and interpret digital evidence found on Linux desktops, servers, and IoT devices, draw logical conclusions, and reconstruct timelines of past activity after a crime or security incident. It's a book written for investigators with varying levels of Linux experience, and the techniques shown are independent of the forensic analysis platform and tools used.
Early chapters provide an overview of digital forensics as well as an introduction to the Linux operating system and popular distributions. From there, the book describes the analysis of storage, filesystems, files and directories, installed software packages, and logs. Special focus is given to examining human user activity such as logins, desktop environments and artifacts, home directories, regional settings, and peripheral devices used.
You'll learn how to: Analyze partition tables, volume management, Linux filesystems, and directory layout; Reconstruct the Linux startup process, from system boot and kernel initialization, to systemd unit files leading up to a graphical login; Perform historical analysis of power, temperature, and physical environment, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes; Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts, VPNs, firewalls, and proxy settings; Perform analysis of time and locale settings, internationalization (language and keyboard settings), and Linux geolocation services; Reconstruct user login sessions, analyze desktop artifacts, and identify traces of attached peripheral devices, including disks, printers, and mobile devices.
4 5 1
by Syed Ali
Practical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions.Using this book, you'll unders...
Price: $54.99 | Publisher: Apress | Release: 2014
by Tajinder Kalsi
Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security aws, and these security aws allow attackers to get into your system and modify or even destroy...
Price: $44.99 | Publisher: Packt Publishing | Release: 2018
by Arturo Fernandez Montoro
System administrators are responsible for keeping servers and workstations working properly. They perform actions to get a secure, stable, and robust operating system. In order to do that, system administrators perform actions such as monitoring, accounts maintenance, restoring backups, and software installation. All these actions and tas...
Price: $9.99 | Publisher: Packt Publishing | Release: 2012
by Tom Adelstein, Bill Lubanovic
If you're an experienced system administrator looking to acquire Linux skills, or a seasoned Linux user facing a new challenge, Linux System Administration offers practical knowledge for managing a complete range of Linux systems and servers. The book summarizes the steps you need to build everything from standalone SOHO hubs, web se...
Price: $29.54 | Publisher: O'Reilly Media | Release: 2007
by Robert Love
Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding.The book details the maj...
Price: $17.33 | Publisher: Addison-Wesley | Release: 2010
by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incid...
Price: $34.00 | Publisher: Wiley | Release: 2014
by Dennis Andriesse
As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out - binary analysis can help. The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs ...
Price: $33.96 | Publisher: No Starch Press | Release: 2018
by Joseph Muniz, Aamir Lakhani
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.Even though web applications are developed in a very secure ...
Price: $29.99 | Publisher: Packt Publishing | Release: 2013