Digital Forensics and Incident Response (Record no. 709166)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01566 a2200181 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251119115114.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 251119b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9789365898712 |
| 040 ## - CATALOGING SOURCE | |
| Language of cataloging | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8/KHA |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Khanna Deepanshu |
| 245 ## - TITLE STATEMENT | |
| Title | Digital Forensics and Incident Response |
| Remainder of title | A practical guide to using Kali Linux for cyber investigations |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Name of publisher, distributor, etc | BPB Publications |
| Date of publication, distribution, etc | 2025 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvii, 268p |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively.It guides readers in setting up a private lab using Kali Linux, explores operating systems and storage devices, and dives into hands-on labs with tools like FTK Imager, volatility, and autopsy. By exploring industry-standard frameworks like NIST, SANS, and MITRE ATT&CK, the book offers a structured approach to incident response. Real-world case studies and practical applications ensure readers can apply their knowledge immediately, whether dealing with system breaches, memory forensics, or mobile device investigations, helping solve cybercrimes and protect organizations.This book is a must-have resource for mastering investigations using the power of Kali Linux and is ideal for security analysts, incident responders, and digital forensic investigators |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Books |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Symbiosis Institute of Computer Studies and Research | Symbiosis Institute of Computer Studies and Research | Linux | 19/11/2025 | Readers World | 701.22 | 005.8/KHA | SICSR-B-19703 | 19/11/2025 | 899.00 | 19/11/2025 | Books | |||||
| Dewey Decimal Classification | Symbiosis Institute of Computer Studies and Research | Symbiosis Institute of Computer Studies and Research | Linux | 19/11/2025 | Readers World | 701.22 | 005.8/KHA | SICSR-B-19702 | 19/11/2025 | 899.00 | 19/11/2025 | Books | |||||
| Dewey Decimal Classification | Symbiosis Institute of Computer Studies and Research | Symbiosis Institute of Computer Studies and Research | Linux | 19/11/2025 | Readers World | 701.22 | 005.8/KHA | SICSR-B-19701 | 19/11/2025 | 899.00 | 19/11/2025 | Books |