万本电子书0元读

万本电子书0元读

顶部广告

Big Data Forensics – Learning Hadoop Investigations电子书

售       价:¥

2人正在读 | 0人评论 9.8

作       者:Joe Sremack

出  版  社:Packt Publishing

出版时间:2015-08-24

字       数:315.9万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
If you are an IT professional, law enforcement, legal professional, or a student interested in Big Data and forensics, this book is your hands-on guide for learning how to conduct Hadoop forensic investigations. Each topic and step in the forensic process is described in accessible language, and no prior experience is required.
目录展开

Big Data Forensics – Learning Hadoop Investigations

Table of Contents

Big Data Forensics – Learning Hadoop Investigations

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the color images of this book

Errata

Piracy

Questions

1. Starting Out with Forensic Investigations and Big Data

An overview of computer forensics

The forensic process

Identification

Collection

Analysis

Presentation

Other investigation considerations

Equipment

Evidence management

Investigator training and certification

The post-investigation process

What is Big Data?

The four Vs of Big Data

Big Data architecture and concepts

Big Data forensics

Metadata preservation

Collection methods

Collection verification

Summary

2. Understanding Hadoop Internals and Architecture

The Hadoop architecture

The components of Hadoop

The Hadoop Distributed File System

The Hadoop configuration files

Hadoop daemons

Hadoop data analysis tools

Hive

HBase

Pig

Managing files in Hadoop

File permissions

Trash

Log files

File compression and splitting

Hadoop SequenceFile

The Hadoop archive files

Data serialization

Packaged jobs and JAR files

The Hadoop forensic evidence ecosystem

Running Hadoop

LightHadoop

Amazon Web Services

Loading Hadoop data

Importing sample data for testing

Summary

3. Identifying Big Data Evidence

Identifying evidence

Locating sources of data

Compiling data requirements

Reviewing the system architecture

Interviewing staff and reviewing the documentation

Assessing data viability

Identifying data sources in noncooperative situations

Data collection requirements

Data source identification

Structured and unstructured data

Data collection types

In-house or third-party collection

The types of data to request

The data collection request

An investigator-led collection

The chain of custody documentation

Summary

4. Collecting Hadoop Distributed File System Data

Forensically collecting a cluster system

Physical versus remote collections

HDFS collections through the host operating system

Imaging the host operating system

Imaging a mounted HDFS partition

Targeted collection from a Hadoop client

The Hadoop shell command collection

Collecting HDFS files

HDFS targeted data collection

Hadoop Offline Image and Edits Viewers

Collection via Sqoop

Other HDFS collection approaches

Summary

5. Collecting Hadoop Application Data

Application collection approaches

Backups

Query extractions

Script extractions

Software extractions

Validating application collections

Collecting Hive evidence

Loading Hive data

Identifying Hive evidence

Hive backup collection

Hive query collection

Hive query control totals

Hive metadata and log collection

The Hive script collection

Collecting HBase evidence

Loading HBase data

Identifying HBase evidence

The HBase backup collection

The HBase query collection

HBase collection via scripts

HBase control totals

HBase metadata and log collection

Collecting other Hadoop application data and non-Hadoop data

Summary

6. Performing Hadoop Distributed File System Analysis

The forensic analysis process

Forensic analysis goals

Forensic analysis concepts

The challenges of forensic analysis

Anti-forensic techniques

Data encryption

Analysis preparation

Analysis

Keyword searching and file and data carving

Bulk Extractor

Autopsy

Metadata analysis

File activity timeline analysis

Other metadata analysis

The analysis of deleted files

HDFS data extraction

Hex editors

Cluster reconstruction

Configuration file analysis

Linux configuration files

Hadoop configuration files

Hadoop application configuration files

Log file analysis

Summary

7. Analyzing Hadoop Application Data

Preparing the analysis environment

Pre-analysis steps

Loading data

Preload data transformations

Data surveying

Transforming data

Transforming nonrelational data

Analyzing data

The analysis approach

Types of investigation

Analysis techniques

Isolating known facts and events

Grouping and clustering

Histograms

The time series analysis

Measuring change over time

Anomaly detection

Rule-based analysis

Duplication analysis

Benford's law

Aggregation analysis

Plotting outliers on a timeline

Analyzing disparate data sets

Keyword searching

Validating the findings

Documenting the findings

Summary

8. Presenting Forensic Findings

Types of reports

Sample reports

Internal investigation report

Affidavit and declaration

Expert report

Developing the report

Explaining the process

Showing the findings

Using exhibits or appendices

Testimony and other presentations

Summary

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部