April 20, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Books (page 4)

Books

Books

Hunt Evil: Your Practical Guide to Threat Hunting

This eBook will guide you through how to assess and improve your threat hunting capabilities, how to prioritize what to hunt for, and share with you proven methods to track advanced threats within massive datasets generated from large, complex networks. Get your copy here.

Read More
Books

Law Enforcement and Forensic Examiner’s Introduction to Linux

Barry J. Grundy has updated his Law Enforcement and Forensic Examiner’s Introduction to Linux – the first time in 10 years! The guide has grown from 190 pages to up over 300! Also Barry has started a YouTube channel – it will be populated with videos soon, don’t forget to subscribe!

Read More
Books

Windows Forensics Cookbook for only 10$!

Windows Forensics Cookbook by Oleg Skulkin and Scar de Courcier is released and and you can buy a digital copy for only 10$ (RRP $35.99!). Hurry, sale ends soon! Windows Forensics Cookbook provides recipes to overcome forensic challenges and helps you carry out effective investigations easily on a Windows platform. You will begin with a refresher on digital forensics and …

Read More
Books

Windows Forensics Cookbook

Packt Publishing has announced a book by Oleg Skulkin (Cyber Forensicator) and Scar de Courcier (Forensic Focus). “Windows Forensics Cookbook” is expected to be published in August 2017. Here is the overview: “This book covers recipes to overcome these challenges and carry out effective investigations easily on a Windows platform. You will begin with a refresher to Digital Forensics and …

Read More
Books

Digital Forensic Diaries

Digital Forensic Diaries series by Mike Sheward is available for free this week. You can get it here. Mike Sheward CISSP, CISM, CCFP-US, CISA, HCISPP, CEH, OSCP, CHFI is an information security manager specializing in the use of ethical hacking techniques to uncover vulnerabilities in application source code and network infrastructure. Mike has performed penetration testing for a wide range …

Read More
Books

Digital Forensics and Incident Response

Another DFIR book has been announced by Packt Publishing. It’s “Digital Forensics and Incident Response” by Gerard Johansen. The book is expected to be published in July 2017. “Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital …

Read More
Books

Python Digital Forensics Cookbook

Another digital forensic book from Packt Publishing has been announced. This time it’s “Python Digital Forensics Cookbook” by Preston Miller and Chapin Bryce. The book is expected to be published in September 2017 and will contain over 60 recipes. Here is the overview: Python is commonly used as a tool for forensic analysis as it provides an outstanding interface for …

Read More
Books

Mobile Forensics Cookbook

Packt Publishing has announced a book by Igor Mikhaylov titled “Mobile Forensics Cookbook”. The book is expected to be published in September 2017. Here is the overview: Considering the emerging use of mobile phones, there is growing need for mobile forensics. Mobile forensics focuses specifically on performing forensic investigations of mobile devices, which involves extracting, recovering and analyzing data for the …

Read More
Books

Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer

Cisco Press has announced a new book by Joseph Muniz and Aamir Lakhani entitled “Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer”. The book is expected to be published in December 2017. You can pre-order it here.

Read More
Books

Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations

Many first time forensic investigators – and even those on most agencies who are tasked with mobile forensic extractions often are missing key components necessary for them to succeed in court. Vendors who produce specialized products generally provide adequate training on their tool but usually exclude basic and advanced validation techniques. The examiner should never rely on the “push button” …

Read More
Page 4 of 512345

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account