

T H E F I N E ST I N G E E K E N T E RTA I N M E N T ™ He is an editor for Digital Investigation and has published research on various digital forensic topics. This is a must-have reference for every digital forensics lab.Ībout the Author Bruce Nikkel is the director of Cyber-Crime / IT Investigation & Forensics at a global financial institution where he has managed the IT forensics unit since 2005. With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. Or challenging situations such as RAID systems, virtual machine images, and damaged media 🔍 Acquire usable images from more complex Words encrypted thumb drives Opal selfencrypting drives OS-encrypted drives using BitLocker, FileVault, and TrueCrypt and others 🔍 Manage drive security such as ATA pass Technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt With cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping 🔍 Preserve and verify evidence integrity 🔍 Manage large forensic image files, stor-Īge capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal

You’ll learn how to: 🔍 Perform forensic imaging of magnetic This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.
Iserial reader 2.0.22 how to#
Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases examine organizational policy violations resolve disputes and analyze cyber attacks. Forensic image acquisition is an important part of postmortem incident response and evidence collection.
