A Case Study Using dd

Table of contents:

Bibliography

Skoudis, Ed, and Lenny Zeltser. Malware: Fighting Malicous Code. Upper Saddle River: Prentice Hall, 2004.

MyKey Technology, Inc. "Technical White Paper: No Write Design Notes." 2003. https://mykeytech.com/nowritepaper1.html.

Technology Pathways, Inc. "ProDiscover Image File Forma." 2003. https://wwwtechpathways.com/uploads/ProDiscoverImageFileFormatv4.pdf.

U.S. Department of Justice. "Test Results for Disc Imaging Tools: SafeBack 2.18." NCJ 200032, June 2003. https://www.ncjrs.org/pdffiles1/nij/20032.pdf.

Part I: Foundations

Digital Investigation Foundations

Computer Foundations

Hard Disk Data Acquisition

Part II: Volume Analysis

Volume Analysis

PC-based Partitions

Server-based Partitions

Multiple Disk Volumes

Part III: File System Analysis

File System Analysis

FAT Concepts and Analysis

FAT Data Structures

NTFS Concepts

NTFS Analysis

NTFS Data Structures

Ext2 and Ext3 Concepts and Analysis

Ext2 and Ext3 Data Structures

UFS1 and UFS2 Concepts and Analysis

UFS1 and UFS2 Data Structures

Summary

Bibliography

Bibliography



File System Forensic Analysis
File System Forensic Analysis
ISBN: 0321268172
EAN: 2147483647
Year: 2006
Pages: 184
Authors: Brian Carrier

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net