Drop your file here to upload it

Create a new directory

files/books/text/digital_forensics/

NameSizeLast modification

Parent directory

50 Reasons for Mastering Cyber Forensics.azw3172.9 KiB7 years ago

172.9 KiB2018-08-23 16:27:38 +12:00 7 years ago

A Practical Guide to Computer Forensics Investigations Free Sample Chapter.pdf15.1 MiB7 years ago

15.1 MiB2018-08-23 16:36:06 +12:00 7 years ago

Advances in Digital Forensics I.pdf19.7 MiB7 years ago

19.7 MiB2018-08-23 16:13:00 +12:00 7 years ago

Advances in Digital Forensics II.pdf35.5 MiB7 years ago

35.5 MiB2018-08-23 16:51:56 +12:00 7 years ago

Advances in Digital Forensics III.pdf12.9 MiB7 years ago

12.9 MiB2018-08-23 16:26:05 +12:00 7 years ago

Advances in Digital Forensics IV.pdf5.4 MiB7 years ago

5.4 MiB2018-08-23 16:05:29 +12:00 7 years ago

Advances in Digital Forensics IX.pdf7.3 MiB7 years ago

7.3 MiB2018-08-23 16:32:36 +12:00 7 years ago

Advances in Digital Forensics V.pdf5.7 MiB7 years ago

5.7 MiB2018-08-23 16:08:18 +12:00 7 years ago

Advances in Digital Forensics VI.pdf3.8 MiB7 years ago

3.8 MiB2018-08-23 16:17:17 +12:00 7 years ago

Advances in Digital Forensics VII.pdf3.6 MiB7 years ago

3.6 MiB2018-08-23 16:34:29 +12:00 7 years ago

Advances in Digital Forensics VIII.pdf8.4 MiB7 years ago

8.4 MiB2018-08-23 16:17:37 +12:00 7 years ago

Advances in Digital Forensics X.pdf6.3 MiB7 years ago

6.3 MiB2018-08-23 16:24:40 +12:00 7 years ago

Advances in Digital Forensics XI.pdf7.5 MiB7 years ago

7.5 MiB2018-08-23 16:33:22 +12:00 7 years ago

Advances in Digital Forensics XII.pdf9.4 MiB7 years ago

9.4 MiB2018-08-23 16:15:35 +12:00 7 years ago

Advances in Digital Forensics XIII.pdf6.4 MiB7 years ago

6.4 MiB2018-08-23 16:20:11 +12:00 7 years ago

Ambient Computing: How Invisible Hardware, Self-Starting Apps, and Nonstop Surveillance Reshapes Our Public and Private Lives.pdf8.8 MiB7 years ago

8.8 MiB2018-08-23 16:27:49 +12:00 7 years ago

Big Data Forensics - Learning Hadoop Investigations: Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques.pdf4.1 MiB7 years ago

4.1 MiB2018-08-23 16:06:02 +12:00 7 years ago

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility.pdf8.3 MiB7 years ago

8.3 MiB2018-08-23 16:10:32 +12:00 7 years ago

Cloud Storage Forensics.pdf5.4 MiB7 years ago

5.4 MiB2018-08-23 16:24:23 +12:00 7 years ago

Computational Forensics 5th International Workshop.pdf24.3 MiB7 years ago

24.3 MiB2018-08-23 16:39:07 +12:00 7 years ago

Computer and Intrusion Forensics.pdf3.3 MiB7 years ago

3.3 MiB2018-08-23 16:20:55 +12:00 7 years ago

Computer Forensics & Digital Investigation with EnCase Forensic v7.pdf40.3 MiB7 years ago

40.3 MiB2018-08-23 16:59:26 +12:00 7 years ago

Computer Forensics and Cyber Crime: An Introduction 3rd Edition.pdf8.3 MiB7 years ago

8.3 MiB2018-08-23 16:37:12 +12:00 7 years ago

Computer Forensics and Privacy.chm3.9 MiB7 years ago

3.9 MiB2018-08-23 16:19:44 +12:00 7 years ago

Computer Forensics for Dummies.pdf9.0 MiB7 years ago

9.0 MiB2018-08-23 16:25:06 +12:00 7 years ago

Computer Forensics JumpStart.pdf7.7 MiB7 years ago

7.7 MiB2018-08-23 16:32:51 +12:00 7 years ago

Computer Forensics with FTK: Enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-worls scenarios.pdf5.0 MiB7 years ago

5.0 MiB2018-08-23 16:31:40 +12:00 7 years ago

Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers.pdf888.8 KiB7 years ago

888.8 KiB2018-08-23 16:14:47 +12:00 7 years ago

Computer Forensics: Computer Crime Scene Investigation 2nd Edition.pdf2.8 MiB7 years ago

2.8 MiB2018-08-23 16:06:15 +12:00 7 years ago

Computer Forensics: Evidence Collection and Management.pdf4.8 MiB7 years ago

4.8 MiB2018-08-23 16:14:58 +12:00 7 years ago

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.pdf64.6 MiB7 years ago

64.6 MiB2018-08-23 17:05:48 +12:00 7 years ago

Cyber Reconnaissance, Surveillance and Defense.pdf24.9 MiB7 years ago

24.9 MiB2018-08-23 16:38:10 +12:00 7 years ago

Cybercrime Case Presentation: Using Digital Forensics and Investigative Techniques to Identify Cybercrime.pdf2.2 MiB7 years ago

2.2 MiB2018-08-23 16:05:51 +12:00 7 years ago

Digital Archaeology: The Art and Science of Digital Forensics.pdf42.3 MiB7 years ago

42.3 MiB2018-08-23 17:01:26 +12:00 7 years ago

Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet 3rd Edition.pdf11.8 MiB7 years ago

11.8 MiB2018-08-23 16:35:32 +12:00 7 years ago

Digital Forensics and Cyber Crime 7th International Conference.pdf44.1 MiB7 years ago

44.1 MiB2018-08-23 16:58:25 +12:00 7 years ago

Digital Forensics for Handheld Devices.pdf8.8 MiB7 years ago

8.8 MiB2018-08-23 16:17:13 +12:00 7 years ago

Digital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom.pdf11.0 MiB7 years ago

11.0 MiB2018-08-23 16:22:13 +12:00 7 years ago

Digital Forensics Processing and Procedures.pdf14.3 MiB7 years ago

14.3 MiB2018-08-23 16:30:41 +12:00 7 years ago

Digital Forensics Trial Graphics: Teaching the Jury through Effective Use of Visuals.pdf7.7 MiB7 years ago

7.7 MiB2018-08-23 16:04:13 +12:00 7 years ago

Digital Forensics with Open Source Tools.pdf4.4 MiB7 years ago

4.4 MiB2018-08-23 16:19:40 +12:00 7 years ago

Digital forensics: An academic introduction.pdf30.7 MiB7 years ago

30.7 MiB2018-08-23 16:41:50 +12:00 7 years ago

Digital Triage Forensics: Processing the Digital Crime Scene.pdf19.5 MiB7 years ago

19.5 MiB2018-08-23 16:24:14 +12:00 7 years ago

Emerging Technology Programs: ADM, Hybrids, Computer Forensics, & MEMS.pdf2.4 MiB7 years ago

2.4 MiB2018-08-23 16:13:08 +12:00 7 years ago

EnCase Computer Forensics: The Official EnCE EnCase Certified Examiner Study Guide 3rd Edition.pdf36.0 MiB7 years ago

36.0 MiB2018-08-23 16:43:36 +12:00 7 years ago

Encyclopedia of Forensic Science - 5 Volume Set.pdf67.2 MiB7 years ago

67.2 MiB2018-08-23 17:04:00 +12:00 7 years ago

File System Forensic Analysis.epub27.0 MiB7 years ago

27.0 MiB2018-08-23 16:44:37 +12:00 7 years ago

Forensic Discovery.pdf1.2 MiB7 years ago

1.2 MiB2018-08-23 16:34:34 +12:00 7 years ago

Forensic Science Education and Training (2017).pdf10.1 MiB7 years ago

10.1 MiB2018-08-23 16:09:44 +12:00 7 years ago

Forensic Science: From Fibers to Fingerprints.pdf6.9 MiB7 years ago

6.9 MiB2018-08-23 16:29:50 +12:00 7 years ago

Forensic Science: Fundamentals and Investigations.pdf31.5 MiB7 years ago

31.5 MiB2018-08-23 16:45:29 +12:00 7 years ago

Forensics in Telecommunications, Information, and Multimedia.pdf4.3 MiB7 years ago

4.3 MiB2018-08-23 16:26:14 +12:00 7 years ago

Fundamentals of Network Forensics: A Research Perspective.pdf5.6 MiB7 years ago

5.6 MiB2018-08-23 16:20:52 +12:00 7 years ago

Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations.pdf6.6 MiB7 years ago

6.6 MiB2018-08-23 16:19:53 +12:00 7 years ago

Guide to Digital Forensics: A Concise and Practical Introduction.pdf5.1 MiB7 years ago

5.1 MiB2018-08-23 16:10:48 +12:00 7 years ago

Hacker Highschool: Lesson 8 Forensics.pdf324.3 KiB7 years ago

324.3 KiB2018-08-23 16:25:30 +12:00 7 years ago

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis.pdf29.6 MiB7 years ago

29.6 MiB2018-08-23 16:46:34 +12:00 7 years ago

How to Defeat Adanced Malware: New Tools for Protection and Forensics.pdf3.8 MiB7 years ago

3.8 MiB2018-08-23 16:32:44 +12:00 7 years ago

Illustrated Guide To Home Forensic Science Experiments.pdf20.7 MiB7 years ago

20.7 MiB2018-08-23 16:53:51 +12:00 7 years ago

Implementing Digital Forensic Readiness: From Reactive to Proactive Process.pdf9.4 MiB7 years ago

9.4 MiB2018-08-23 16:21:20 +12:00 7 years ago

Incident Response: Computer Forensics Toolkit.pdf4.8 MiB7 years ago

4.8 MiB2018-08-23 16:05:34 +12:00 7 years ago

Internet Forensics 2005.chm843.5 KiB7 years ago

843.5 KiB2018-08-23 16:20:11 +12:00 7 years ago

Investigative Computer Forensics: The Practical Guide to Lawyers, Accountants, Investigators, and Business Executives.pdf2.9 MiB7 years ago

2.9 MiB2018-08-23 16:35:52 +12:00 7 years ago

iPhone Forensics 1st Edition.chm4.0 MiB7 years ago

4.0 MiB2018-08-23 16:06:49 +12:00 7 years ago

Learning iOS Forensics.pdf6.1 MiB7 years ago

6.1 MiB2018-08-23 16:29:50 +12:00 7 years ago

Learning Network Forensics.pdf9.6 MiB7 years ago

9.6 MiB2018-08-23 16:37:27 +12:00 7 years ago

Learning Python for Forensics: Learn the art of designing, developing, and deploying innovative forensic solutions through Python.pdf11.7 MiB7 years ago

11.7 MiB2018-08-23 16:27:21 +12:00 7 years ago

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit.pdf42.5 MiB7 years ago

42.5 MiB2018-08-23 16:50:13 +12:00 7 years ago

Malware Forensics Field Guide for Windows Systems.pdf28.4 MiB7 years ago

28.4 MiB2018-08-23 16:55:43 +12:00 7 years ago

Malware Forensics: Investigating and Analyzing Malicious Code.pdf25.0 MiB7 years ago

25.0 MiB2018-08-23 16:47:27 +12:00 7 years ago

Master Windows Network Forensics and Investigation 2nd Edition.pdf40.2 MiB7 years ago

40.2 MiB2018-08-23 17:06:40 +12:00 7 years ago

Mastering Mobile Forensics: Develop the capacity to dig deeper into mobile device data acquisition.pdf15.7 MiB7 years ago

15.7 MiB2018-08-23 16:36:47 +12:00 7 years ago

Mastering Python Forensics: Master the art of digital forensics and anaylsis with Python.pdf2.2 MiB7 years ago

2.2 MiB2018-08-23 16:30:44 +12:00 7 years ago

Mastering Windows Network Forensics and Investigation.chm45.2 MiB7 years ago

45.2 MiB2018-08-23 16:56:32 +12:00 7 years ago

Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation.epub22.4 MiB7 years ago

22.4 MiB2018-08-23 16:52:58 +12:00 7 years ago

Mobile Forensics Cookbook: Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools.epub53.0 MiB7 years ago

53.0 MiB2018-08-23 16:54:48 +12:00 7 years ago

Mobile Forensics: Advanced Investigative Strategies: Master powerful strategies to acquire and analyze evidence from real-life scenarios.pdf26.3 MiB7 years ago

26.3 MiB2018-08-23 17:04:58 +12:00 7 years ago

Mobile Phone Security and Forensics.pdf2.2 MiB7 years ago

2.2 MiB2018-08-23 16:24:18 +12:00 7 years ago

Open Source Software for Digital Forensics.pdf3.7 MiB7 years ago

3.7 MiB2018-08-23 16:34:14 +12:00 7 years ago

Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches.pdf2.7 MiB7 years ago

2.7 MiB2018-08-23 16:29:39 +12:00 7 years ago

Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring.pdf5.5 MiB7 years ago

5.5 MiB2018-08-23 16:21:53 +12:00 7 years ago

Pioneers in Forensic Science: Innovations and Issues in Practice.pdf3.6 MiB7 years ago

3.6 MiB2018-08-23 16:36:53 +12:00 7 years ago

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf21.6 MiB7 years ago

21.6 MiB2018-08-23 16:35:50 +12:00 7 years ago

Plato's Dreams Realized Surveillance and Citizen Rights, from KGB to FBI.pdf1.4 MiB7 years ago

1.4 MiB2018-08-23 16:16:07 +12:00 7 years ago

Practical Digital Forensics: Get started with the art and science of digital forensics with this practical, hands-on guide.pdf11.7 MiB7 years ago

11.7 MiB2018-08-23 16:18:18 +12:00 7 years ago

Practical Windows Forensics: Leverage the power of digital forensics for Windows systems.pdf19.8 MiB7 years ago

19.8 MiB2018-08-23 16:23:38 +12:00 7 years ago

Scene of the Cybercrime - Computer Forensics Handbook.pdf2.2 MiB7 years ago

2.2 MiB2018-08-23 16:33:41 +12:00 7 years ago

Surveillance and Security.pdf2.2 MiB7 years ago

2.2 MiB2018-08-23 16:13:44 +12:00 7 years ago

Surveillance in Action: Technologies for Civilian, Military and Cyber Surveillance.pdf14.3 MiB7 years ago

14.3 MiB2018-08-23 16:28:23 +12:00 7 years ago

Surveillance Systems: Design, Applications and Technology.pdf8.7 MiB7 years ago

8.7 MiB2018-08-23 16:06:26 +12:00 7 years ago

The Basics of Digital Forensics.pdf6.7 MiB7 years ago

6.7 MiB2018-08-23 16:20:07 +12:00 7 years ago

The Basics of Digital Forensics: The Primer for Getting Started in DIgital Forensics 2nd Edition.pdf6.6 MiB7 years ago

6.6 MiB2018-08-23 16:31:21 +12:00 7 years ago

Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments.pdf17.2 MiB7 years ago

17.2 MiB2018-08-23 16:32:24 +12:00 7 years ago

Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting.pdf7.1 MiB7 years ago

7.1 MiB2018-08-23 16:32:18 +12:00 7 years ago

VoIP and PBX Security and Forensics: A Practical Approach 2nd Edition.pdf5.0 MiB7 years ago

5.0 MiB2018-08-23 16:31:46 +12:00 7 years ago

Windows Forensic Analysis DVD Toolkit 2nd Edition.pdf5.9 MiB7 years ago

5.9 MiB2018-08-23 16:12:39 +12:00 7 years ago

Windows Forensic Analysis DVD Toolkit.pdf45.4 MiB7 years ago

45.4 MiB2018-08-23 16:57:35 +12:00 7 years ago

Windows Forensics and Incident Recovery.chm7.2 MiB7 years ago

7.2 MiB2018-08-23 16:23:49 +12:00 7 years ago

Windows Forensics.chm12.6 MiB7 years ago

12.6 MiB2018-08-23 16:24:53 +12:00 7 years ago

Windows Registry Forensics 2nd Edition.pdf11.5 MiB7 years ago

11.5 MiB2018-08-23 16:32:04 +12:00 7 years ago

Windows Registry Forensics.pdf3.6 MiB7 years ago

3.6 MiB2018-08-23 16:10:06 +12:00 7 years ago

Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs.pdf6.9 MiB7 years ago

6.9 MiB2018-08-23 16:27:32 +12:00 7 years ago

Starting upload...