Goodreads helps you keep track of books you want to read.
Start by marking “Real Digital Forensics: Computer Security and Incident Response” as Want to Read:
Real Digital Forensics: Computer Security and Incident Response
Enlarge cover
Rate this book
Clear rating
Open Preview

Real Digital Forensics: Computer Security and Incident Response

4.16  ·  Rating details ·  76 ratings  ·  4 reviews
You can't succeed in the field of computer forensics without hands-on practice--and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and ...more
Paperback, 688 pages
Published September 23rd 2005 by Addison Wesley
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Real Digital Forensics, please sign up.

Be the first to ask a question about Real Digital Forensics

Community Reviews

Showing 1-30
Average rating 4.16  · 
Rating details
 ·  76 ratings  ·  4 reviews


More filters
 | 
Sort order
Start your review of Real Digital Forensics: Computer Security and Incident Response
Takedown
May 07, 2017 rated it really liked it
I love how old this book is and yet how relevant those topics are today.
Incident Response is way more important today than back then, but it blows my mind that some people started doing it way back before it became mainstream. Truly pioneers of the field.
It is a practical, hands-on DFIR book, however most of the tools is outdated. This is expected for any technical books, that focus on tools.
It is still useful and relevant today since methods largely the same, so worth a read anyway. You just h
...more
Trevlix
Jul 17, 2007 rated it it was amazing
Recommends it for: Security Geeks
If you want a book which will SHOW, and not just tell you, how to do forensics on Windows and Linux as well as network forensics and malware analysis, this is the book for you. Written by definite experts in the industry.

I would normally give this a 5, but there are a few minor typos which spoiled it for me. They also left out a few explanations which I thought should be in there. Still worth having on your bookshelf.
Justine
May 30, 2013 rated it really liked it
Shelves: tech
Good practical tools - fairly easy to read and understand - not a whole lot of concepts; this was mainly a "how-to" guide on a lot of related, but independent tools & processes. ...more
Thad Butterworth
Aug 21, 2018 rated it liked it
Dry, but full of good information.
Paul Jaramillo
rated it it was amazing
Jul 03, 2015
Chris
rated it liked it
Sep 15, 2011
Epicurean
rated it it was ok
May 05, 2012
Timo
rated it liked it
Jan 20, 2012
Paul Watson
rated it it was amazing
Oct 27, 2018
Harry Rose
rated it really liked it
Nov 28, 2019
Xavier
rated it liked it
Apr 16, 2020
Richard Bejtlich
rated it it was amazing
Dec 11, 2019
VintiqueBooks
rated it it was amazing
Mar 20, 2019
Dustin Lenz
rated it it was amazing
Jun 08, 2016
Chris Reesman
rated it it was amazing
May 15, 2013
William
rated it liked it
Aug 24, 2014
Mr Jon Klein
rated it really liked it
Dec 08, 2017
Joseph
rated it it was amazing
Mar 07, 2019
Dwayne
rated it it was amazing
Jun 13, 2013
Rumell Khan
rated it it was amazing
Aug 13, 2018
Erik Moore
rated it it was amazing
Oct 01, 2011
Dean
rated it really liked it
Aug 26, 2012
Cassinator
rated it liked it
Oct 17, 2014
Mark Stanhope
rated it it was amazing
Aug 28, 2020
Anton
rated it it was amazing
May 06, 2013
Alicia Deavens
rated it really liked it
Mar 18, 2017
Adrian
rated it it was amazing
Jul 05, 2014
Stephen
rated it really liked it
Jul 19, 2015
Leland
rated it really liked it
Oct 16, 2008
Andrew Douma
rated it it was amazing
Jun 26, 2016
« previous 1 3 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Star Wars®: The Jedi Path and Book of Sith Deluxe Box Set (Star Wars Gifts, Sith Book, Jedi Code, Star Wars Book Set)
  • Born to Build: How to Build a Thriving Startup, a Winning Team, New Customers and Your Best Life Imaginable
  • The 1776 Report
  • The Lifetime Learner's Guide to Reading and Learning
  • Hank Aaron and the Home Run That Changed America
  • What's So Great About Christianity
  • Extrusion Detection: Security Monitoring for Internal Intrusions
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Old School Jiu-Jitsu Manifesto
  • Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
  • Before the Broken Star (The Evermore Chronicles #1)
  • Valdor: Birth of the Imperium (The Horus Heresy: Characters)
  • Perfect Shadow (Night Angel, #0.5)
  • Trollslayer (Gotrek & Felix #1)
  • Critical Role: Vox Machina Origins Volume II
  • The Tao of Network Security Monitoring: Beyond Intrusion Detection
  • Will Save the Galaxy for Food (Jacques McKeown, #1)
  • Kryptos (The Horus Heresy Short Story)
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

News & Interviews

  Jordan Morris is a comedy writer and podcaster whose credits include @Midnight, Unikitty! and Earth to Ned.  The sci-fi comedy Bubble is his...
3 likes · 1 comments