184 Homepage | Reading Schedule | Internet Resources |
The textbook is Computer Evidence: Collection and Preservation, 2nd Edition, by Christopher Brown. We will be skipping around a bit in the book, so please refer to the schedule below to properly prepare for lectures.
Textbook: Chapter 1 (pg 3-23). Chapter 9 (189-208).
Other reading:
Newegg.com: Motherboards. Hard drives.
Amazon.com: Bestselling laptops. Bestselling network equipment.
Hammack, Bill. How A Hard Drive Works. http://www.youtube.com/watch?v=Wiy_eHdj8kg
Textbook: Chapters 7-8 (pg 145-206). Appendix F (pg 431-441).
Other Reading:
Wikipedia. Operating System. http://en.wikipedia.org/wiki/Operating_system
Wikipedia. File System. http://en.wikipedia.org/wiki/Filesystem
Textbook: Chapter 10, 11 and 12 (pg 207-294)
Textbook: Chapter 14, 15, 16 (pg 315-386)
Other reading:
Gutmann, Peter. Secure Deletion of Data from Magnetic and Solid State Memory. http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Textbook: Chapter 5 (pg 95-120)
Other reading:
Graham, Robert. Sniffing (network wiretap, sniffer) FAQ. http://cs.baylor.edu/~donahoo/tools/sniffer/sniffingFAQ.htm
Schneier, Bruce. The war against cybercrime.http://www.youtube.com/view_play_list?p=8C18A169750D00C0
Zeltser, Lenny. The Evolution of Malicious Agents. http://zeltser.com/malicious-agents/
Also look in the bookmarks list (http://www.delicious.com/ppphowell/cops) for stories that refer to "botnets".
Other reading:
Oxygen Software. Mobile Forensic Analysis for Smartphones. http://www.oxygen-forensic.com/download/presentations/mfa_smartphones.html
Oxygen Software. Oxygen Suite Videos. http://www.youtube.com/user/oxygenforensic
Textbook: Chapter 2 & 3 (pg 25-70)
Other Reading: Computer Evidence exerpt.
Textbook: Chapter 17 (pg 387-405) and Appendix G (pg 443-480)
Other reading:
Defcon 17, 2011. Computer Crime Year in Review. http://www.youtube.com/watch?v=b0prEMItQe4
Grundy, Barry J. Linux LEO Beginner's Guide. http://www.linuxleo.com/Docs/linuxintro-LEFE-3.78.pdf