AboutDFIR.com – The Definitive Compendium Project
Digital Forensics & Incident Response

Showing 1-20 of 31 Books
Applied Incident Response Applied Incident Response
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective...
Computers Steve Anson
Blue Team Field Manual (BTFM) Blue Team Field Manual (BTFM)
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond,...
Computers Alan White
Crafting the InfoSec Playbook
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own...
Jeff Bollinger, Brandon Enright, & Matthew Valites
Cybercrime and Digital Forensics Cybercrime and Digital Forensics
"Types of hardware, peripherals, and electronic evidence" -- "Evidence integrity" -- "Summary" -- "13 ACQUISITION AND EXAMINATION OF FORENSIC EVIDENCE" -- "Introduction" -- "Data preservation" -- "Digital forensic imaging tools"...
Computer crimes Thomas J. Holt
Digital Forensics and Incident Response – Second Edition Digital Forensics and Incident Response – Second Edition
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware...
Computers Gerard Johansen
Digital Forensics for Legal Professionals Digital Forensics for Legal Professionals
Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors' years of experience in working with attorneys as digital forensics...
Computers Lars E. Daniel
Digital Forensics with Open Source Tools Digital Forensics with Open Source Tools
Based on the use of open source tools, this book lends itself to many organizations as well as students who do not have means to purchase new tools for different...
Computers Cory Altheide
EnCase Computer Forensics EnCase Computer Forensics
The official, Guidance Software-approved book on the newest EnCE exam! The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the...
Computers Steve Bunting
EZ Tools Manuals EZ Tools Manuals
The official manual for Eric Zimmerman's Tools.
Eric Zimmerman and Andrew Rathbun
File System Forensic Analysis File System Forensic Analysis
Moves beyond the basics and shows how to use tools to recover and analyze forensic evidence.
Computers Brian Carrier
Handbook of Digital Forensics and Investigation Handbook of Digital Forensics and Investigation
The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation...
Computers Eoghan Casey
Incident Response & Computer Forensics, Third Edition Incident Response & Computer Forensics, Third Edition
The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics,...
Computers Kevin Mandia
Incident Response Techniques for Ransomware Attacks Incident Response Techniques for Ransomware Attacks
Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and tools Key Features:...
Computer security, Computers Oleg Skulkin
Incident Response with Threat Intelligence Incident Response with Threat Intelligence
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligence Key Features: Understand best practices for detecting, containing, and recovering from modern...
Roberto Martinez
Intelligence-driven Incident Response Intelligence-driven Incident Response
Threat intelligence—understanding the who, why, and how of attacks—is most valuable when applied directly to an organization’s incident response capability for hunting and investigation. Threat intelligence has become more common...
Computers Scott J. Roberts
Investigating Windows Systems Investigating Windows Systems
Investigating Windows Systems helps readers discover the detailed tools they will need to perform research. It provides a walk-through of the analysis process, with descriptions of thought processes and an...
Law Harlan Carvey
Linux Field Manual (LFM) Linux Field Manual (LFM)
A reference manual for Linux that has descriptions of core functions and and has command line tools, with popular applications such as docker and kubectl
Computers Tim Bryant
Mastering Python Forensics Mastering Python Forensics
Master the art of digital forensics and analysis with PythonAbout This Book- Learn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of...
Computer crimes Michael Spreitzenbarth
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition Mobile Forensic Investigations: A Guide to Evidence Collection,...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Master the tools...
Computers Lee Reiber
OS X Incident Response OS X Incident Response
" OS X Incident Response: Scripting and Analysis" is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of...
Jaron Bradley