| Management number | 220024628 | Release Date | 2026/05/03 | List Price | $14.40 | Model Number | 220024628 | ||
|---|---|---|---|---|---|---|---|---|---|
| Category | |||||||||
Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack encrypted containers, analyze Windows memory, and detect tampering using realistic hands-on forensic datasets.Key FeaturesMaster field-tested workflows for triage, acquisition, and cross-platform analysisUncover hidden activity, recover evidence, defeat encryption, and detect tamperingBuild hands-on investigation skills using realistic datasets across major platformsPurchase of the print or Kindle book includes a free PDF ebookBook DescriptionModern investigations and incident response efforts live and die by digital evidence. Digital Forensics Cookbook uses realistic datasets and practical workflows drawn from real investigations to uncover the truth hidden inside computers, mobile devices, and online accounts.Rather than focusing on theory alone, this book moves you through the investigative process from triage and acquisition to artifact analysis, memory forensics, encryption challenges, malware triage, and detecting anti-forensic behavior. Along the way, you’ll perform remote artifact collection, analyze evidence across Windows, macOS, Linux, iOS, and Android systems, investigate cloud-synced accounts, recover deleted data, manually carve evidence when tools fail, and identify attempts to hide or manipulate data.As you progress through the book, you’ll learn how to write and apply regular expressions and SQLite queries, build system timelines, baseline systems, automate analysis, verify findings across independent sources, generate custom password dictionaries to crack encrypted containers, detect metadata tampering designed to mislead investigators, and analyze Windows memory. By the end, you won’t just know how to run forensic tools; you’ll understand how investigators think, enabling you to turn scattered digital traces into clear, defensible conclusions.What you will learnPerform triage and acquire evidence during live investigationsCollect artifacts remotely using incident response workflowsAnalyze evidence across Windows, macOS, Linux, iOS, and AndroidRecover deleted data and manually carve evidence when tools failCrack encrypted containers using custom password dictionariesUse regex and SQLite queries to uncover hidden investigative cluesDetect anti-forensic techniques and metadata tamperingAnalyze Windows memory using Volatility to uncover live artifactsWho this book is forThis book is for digital forensic investigators, incident responders, and security professionals who want to build practical investigation skills using real-world workflows and realistic datasets. It’s also ideal for students and analysts entering the field who want hands-on experience recovering evidence, analyzing artifacts, and thinking like an investigator.Table of ContentsTargeted On-Scene TriageNetwork Intrusion Response and Remote TriagePhysical and Cloud-Based Evidence AcquisitionMicrosoft WindowsApple macOS and LinuxApple iOS and AndroidAnalysis AutomationUser ArtifactsManual Analysis and TechniquesOvercoming Anti-ForensicsMemory Forensics Read more
| ISBN10 | 1805127551 |
|---|---|
| ISBN13 | 978-1805127550 |
| Language | English |
| Publisher | Packt Publishing |
| Dimensions | 7.5 x 1.34 x 9.25 inches |
| Item Weight | 2.21 pounds |
| Print length | 592 pages |
| Publication date | March 31, 2026 |
If you notice any omissions or errors in the product information on this page, please use the correction request form below.
Correction Request Form