liuyan1
驱动老牛
驱动老牛
  • 注册日期2001-08-27
  • 最后登录2023-04-18
  • 粉丝0
  • 关注0
  • 积分1031分
  • 威望477点
  • 贡献值0点
  • 好评度187点
  • 原创分0分
  • 专家分0分
  • 社区居民
阅读:2333回复:15

文件系统新书<<File System Forensic Analysis>>

楼主#
更多 发布于:2005-08-03 16:46
  Table of Contents
1. Digital Investigation Foundations.

2. Computer Foundations.

3. Hard Disk Data Acquisition.

4. Volume Analysis.

5. PC-based Partitions.

6. Server-based Partitions.

7. Multiple Disk Volumes.

8. File System Analysis.

9. FAT Concepts and Analysis.

10. FAT Data Structures.

11. NTFS Concepts.

12. NTFS Analysis.

13. NTFS Data Structures.

14. Ext2 and Ext3 Concepts and Analysis.

15. Ext2 and Ext3 Data Structures.

16. UFS1 and UFS2 Concepts and Analysis.

17. UFS1 and UFS2 Data Structures.

Appendix. The Sleuth Kit and Autopsy.



Brian Carrier
Addison-Wesley, Paperback, Published March 2005, 569 pages, ISBN 0321268172
List Price: $49.99
Our Price: $28.25
You Save: $21.74 (43% Off)
 

 
Availability: In-Stock  


Moves beyond the basics and shows how to use tools to recover and analyze forensic evidence.
Brian Carrier is a leader in the field, and his book is positioned to be the authoritative reference.

More advanced and specific than current books, all of which present general overviews of the forensic analysis process.

Companion Web site includes open source tools used in the book and sample file system images.
Preface

One of the biggest challenges that I have faced over the years while developing The Sleuth Kit (TSK) has been finding good file system and media management (partition tables, RAID etc.) documentation. It has also been challenging to explain to users why certain files cannot be recovered or what to do when a corrupt file system is encountered because there are no good references to refer them to. It is easy to find resources that describe file systems at a high level, but source code is typically needed to learn the details. This book describes how data are stored on disk and where and how digital evidence can be found.

There are two target audiences for this book. One is the experienced investigator that has learned about digital investigations from real cases and using analysis tools. The other is someone who is new to the field and is interested in learning about the general theory of an investigation and where digital evidence may exist, but is not yet looking for a book that has a tutorial on how to use a specific tool.

The value of the material in this book is that it helps to provide an education rather than training on a specific tool. Consider some of the more formal sciences or engineering disciplines. All undergraduates are required to take a couple of semesters of physics, chemistry, or biology. These courses are not required because the students will be using all of the material for the rest of their careers. In fact, software and equipment exist to perform many of the calculations students are forced to memorize. The point of the classes is to provide students with insight about how things work so that they are not constrained by their tools.

The goal of this book is to provide an investigator with an education similar to what Physics 101 is to a mechanical engineer. The majority of digital evidence is found on a disk and knowing how and why the evidence exists can help an investigator to better testify about it. It will also help an investigator find errors and bugs in his analysis tools because he can conduct sanity checks on the tool output.

The recent trends in digital investigations have shown that more education is needed. Forensic labs are being accredited for digital evidence and there are debates about the required education and certification levels. Numerous universities offer courses and even Master's degrees in computer forensics. Government and university labs are conducting theoretical research in the area and focusing on future as well as current problems. There are also peer-reviewed journals for publishing research and investigation techniques. All of these new directions require in-depth knowledge outside of a specific tool or technique.

The approach of this book is to describe the basic concepts and theory of a file system and then apply it to an investigation. For each file system, the book covers analysis techniques and special considerations that the investigator should make. Scenarios are given to reinforce how the information can be used in an actual case. In addition, the data structures associated with file system and media management system are given and disk images are analyzed by hand so that the reader can see where the various data are located. If you are not interested in parsing data structures then you can skip those sections. Only non-commercial tools are used so that you can download them for free and duplicate the results on your systems.
Roadmap

This book is organized into three parts. Part 1 provides the basic foundations and Parts 2 and 3 provide the technical meat of the book. The book is organized so that we move up the layers of abstraction in a computer. We start by discussing hard disks and then discuss how disks are organized into partitions. After we discuss partitions, we discuss the contents of partitions, which is typically a file system.

Part 1 starts with Chapter 1 and discusses the approach that I take to a digital investigation. The different phases and guidelines are presented so that you know where I use the techniques described in this book. This book does not require that you use the same approach that I do. Chapter 2 provides the computer foundations and describes data structures, data encoding, the boot process, and hard disk technology. Chapter 3 provides the theory and a case study of hard disk acquisition so that we have data to analyze in Parts 2 and 3.

Part 2 of the book is on Media Management Analysis, which is the analysis of data structures that organize storage devices. This is typically the lowest layer of data structures on a disk. Chapter 4 provides a general overview of the analysis techniques and Chapter 5 covers the common DOS partitions as well as Apple partitions and GPT partitions, which are found in IA64 systems. Chapter 6 covers Unix partitions that can be found in BSD and Sun systems. Chapter 7 covers media management systems that span multiple disks, including RAID and volume spanning.

Part 3 of the book is on File System Analysis, which is the analysis of data structures that organize the partitions. Chapter 8 covers the general theory of file system analysis and defines terminology for the rest of Part 3. Each file system has at least two chapters dedicated to it where the first chapter covers the basic concepts and investigation techniques and the second chapter includes the data structures and manual analysis of example disk images. You have a choice of reading the two chapters in parallel, reading one after the other, or skipping the data structures chapter altogether.

The designs of the file systems are very different and therefore they are described using a general file system model. The general model organizes the data in a file system into one of five categories: file system, content, metadata, file name, and application. This general model is used to describe each of the file systems so that it is easier to compare them.

Chapters 9 and 10 cover the common FAT file system and Chapters 11, 12, and 13 cover NTFS. Next, we skip to the Unix file systems with Chapters 14 and 15 on the Linux EXT2 and EXT3 file systems. Lastly, Chapters 16 and 17 cover UFS1 and UFS2, which are found in FreeBSD, NetBSD, OpenBSD, and Sun Solaris.

After Part 3 of this book, you will know where a file existed on disk and all of the various data structures that needed to be in sync for you to view it. This book does not discuss how to analyze the file's contents. That falls into the Application Analysis realm and requires another book.
楼上的客,楼下的客,听我老坎说明白,要苛屎有草纸,不要扯我的麦席子,要苛尿有夜壶,不要在床上划地图。
zhjie374
驱动小牛
驱动小牛
  • 注册日期2004-10-27
  • 最后登录2012-01-17
  • 粉丝2
  • 关注1
  • 积分17分
  • 威望144点
  • 贡献值1点
  • 好评度21点
  • 原创分0分
  • 专家分0分
沙发#
发布于:2005-08-03 16:50
国内有卖吗?
恐怕和以前一样只能邮寄,300美刀啊
znsoft
管理员
管理员
  • 注册日期2001-03-23
  • 最后登录2023-10-25
  • 粉丝300
  • 关注6
  • 积分910分
  • 威望14796点
  • 贡献值7点
  • 好评度2410点
  • 原创分5分
  • 专家分100分
  • 社区居民
  • 最爱沙发
  • 社区明星
板凳#
发布于:2005-08-03 17:00
如果人多,我们可以引进:)
http://www.zndev.com 免费源码交换网 ----------------------------- 软件创造价值,驱动提供力量! 淡泊以明志,宁静以致远。 ---------------------------------- 勤用搜索,多查资料,先搜再问。
kernel_kernel
驱动小牛
驱动小牛
  • 注册日期2002-12-08
  • 最后登录2009-02-06
  • 粉丝0
  • 关注0
  • 积分435分
  • 威望51点
  • 贡献值0点
  • 好评度41点
  • 原创分0分
  • 专家分0分
地板#
发布于:2005-08-03 21:08
下面是引用znsoft于2005-08-03 17:00发表的:
如果人多,我们可以引进:)


lgh41
驱动小牛
驱动小牛
  • 注册日期2004-12-14
  • 最后登录2006-09-24
  • 粉丝0
  • 关注0
  • 积分203分
  • 威望28点
  • 贡献值0点
  • 好评度14点
  • 原创分0分
  • 专家分0分
地下室#
发布于:2005-08-04 09:25
从目录看,这可能是一本系统介绍文件系统的好书!
遗憾的是,我国的出版界为什么一直处在麻木不仁的状态?
有影响的大老应向出版界呼吁!毕竟,他们是大舰队!
lgh41
platform
驱动牛犊
驱动牛犊
  • 注册日期2005-03-30
  • 最后登录2012-03-10
  • 粉丝0
  • 关注0
  • 积分12分
  • 威望154点
  • 贡献值0点
  • 好评度69点
  • 原创分0分
  • 专家分0分
5楼#
发布于:2005-08-04 14:40
支持引进
xx_qiang
驱动小牛
驱动小牛
  • 注册日期2004-07-30
  • 最后登录2017-02-27
  • 粉丝2
  • 关注1
  • 积分31分
  • 威望249点
  • 贡献值0点
  • 好评度171点
  • 原创分0分
  • 专家分0分
  • 社区居民
6楼#
发布于:2005-08-04 14:43
好书不用多,一本就够了。我倒是觉着能把file system internels看透了再说吧
idaxsy
驱动大牛
驱动大牛
  • 注册日期2004-12-09
  • 最后登录2006-03-17
  • 粉丝0
  • 关注0
  • 积分386分
  • 威望54点
  • 贡献值0点
  • 好评度8点
  • 原创分0分
  • 专家分0分
7楼#
发布于:2005-08-04 14:55
出版商也不是麻木,而是太精明了。
[b]万水千山总是情,回个帖子行不行?[/b]
platform
驱动牛犊
驱动牛犊
  • 注册日期2005-03-30
  • 最后登录2012-03-10
  • 粉丝0
  • 关注0
  • 积分12分
  • 威望154点
  • 贡献值0点
  • 好评度69点
  • 原创分0分
  • 专家分0分
8楼#
发布于:2005-08-04 15:19
支持引进
liuyan1
驱动老牛
驱动老牛
  • 注册日期2001-08-27
  • 最后登录2023-04-18
  • 粉丝0
  • 关注0
  • 积分1031分
  • 威望477点
  • 贡献值0点
  • 好评度187点
  • 原创分0分
  • 专家分0分
  • 社区居民
9楼#
发布于:2005-08-05 11:15
znsoft 老大,偶将该书预览的第5章"基于PC的分区"上传,没详细看,看了一下其示意图,觉得是看到的做的最直观的.大家都评价一下,看目录这本书仿佛并非只针对NT的文件系统,但可能是近几年来唯一的文件系统的新书了.在亚马讯现在评价也不错,5个星.如果是好书,强烈支持引进
附件名称/大小 下载次数 最后更新
0321268172.zip (183KB)  133
楼上的客,楼下的客,听我老坎说明白,要苛屎有草纸,不要扯我的麦席子,要苛尿有夜壶,不要在床上划地图。
alibaba00
驱动牛犊
驱动牛犊
  • 注册日期2005-07-22
  • 最后登录2011-06-08
  • 粉丝0
  • 关注0
  • 积分334分
  • 威望39点
  • 贡献值0点
  • 好评度25点
  • 原创分0分
  • 专家分0分
10楼#
发布于:2005-08-05 11:58
大家一起来呼吁啊!争取多点人。
yearnyan
驱动牛犊
驱动牛犊
  • 注册日期2004-06-17
  • 最后登录2016-01-09
  • 粉丝0
  • 关注0
  • 积分40分
  • 威望5点
  • 贡献值0点
  • 好评度2点
  • 原创分0分
  • 专家分0分
11楼#
发布于:2005-08-05 16:04
网上有的下呀,就在下<<Inside NT>>的地方,不过看电子书真受不了.
ldljlzw
驱动中牛
驱动中牛
  • 注册日期2002-03-16
  • 最后登录2014-01-02
  • 粉丝1
  • 关注0
  • 积分1021分
  • 威望372点
  • 贡献值0点
  • 好评度187点
  • 原创分0分
  • 专家分0分
12楼#
发布于:2005-08-07 00:33
znsoft
管理员
管理员
  • 注册日期2001-03-23
  • 最后登录2023-10-25
  • 粉丝300
  • 关注6
  • 积分910分
  • 威望14796点
  • 贡献值7点
  • 好评度2410点
  • 原创分5分
  • 专家分100分
  • 社区居民
  • 最爱沙发
  • 社区明星
13楼#
发布于:2005-08-07 09:47
既然有电子版就算了.hehe 如果有需求,可以帮大家复印一下.用电子版打印后复印,这样没有购书成本了.
http://www.zndev.com 免费源码交换网 ----------------------------- 软件创造价值,驱动提供力量! 淡泊以明志,宁静以致远。 ---------------------------------- 勤用搜索,多查资料,先搜再问。
znsoft
管理员
管理员
  • 注册日期2001-03-23
  • 最后登录2023-10-25
  • 粉丝300
  • 关注6
  • 积分910分
  • 威望14796点
  • 贡献值7点
  • 好评度2410点
  • 原创分5分
  • 专家分100分
  • 社区居民
  • 最爱沙发
  • 社区明星
14楼#
发布于:2005-08-07 10:02
已经转到下载中心,大家自己去找吧.
http://www.zndev.com 免费源码交换网 ----------------------------- 软件创造价值,驱动提供力量! 淡泊以明志,宁静以致远。 ---------------------------------- 勤用搜索,多查资料,先搜再问。
idaxsy
驱动大牛
驱动大牛
  • 注册日期2004-12-09
  • 最后登录2006-03-17
  • 粉丝0
  • 关注0
  • 积分386分
  • 威望54点
  • 贡献值0点
  • 好评度8点
  • 原创分0分
  • 专家分0分
15楼#
发布于:2005-08-08 16:03
已经下载了。
[b]万水千山总是情,回个帖子行不行?[/b]
游客

返回顶部