Forwarded from: "Rob, grandpa of Ryan, Trevor, Devon & Hannah" <rslade@private> BKFSFRAN.RVW 20050608 "File System Forensic Analysis", Brian Carrier, 2005, 0-321-26817-2, U$49.99/C$69.99 %A Brian Carrier %C P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario M3C 2T8 %D 2005 %G 0-321-26817-2 %I Addison-Wesley Publishing Co. %O U$49.99/C$69.99 416-447-5101 800-822-6339 bkexpress@private %O http://www.amazon.com/exec/obidos/ASIN/0321268172/robsladesinterne http://www.amazon.co.uk/exec/obidos/ASIN/0321268172/robsladesinte-21 %O http://www.amazon.ca/exec/obidos/ASIN/0321268172/robsladesin03-20 %O Audience a- Tech 2 Writing 1 (see revfaq.htm for explanation) %P 569 p. %T "File System Forensic Analysis" The preface states, correctly, that there is little information for the forensic investigator on the topic of file system structures and internals that are useful for providing direction on tracing and tracking information on the disk. The author also notes that there are a number of worthwhile texts that address the general topic of investigation. Therefore, the author intends to address the former rather than the latter. At the same time, there is an implication in the initial section that this work is only the merest introduction to the subject of computer forensics. Part one is aimed at providing foundational concepts. Chapter one, in fact, does provide a quick review of the investigation process, and a list of forensic software toolkits. A sort of "Computers 101" is in chapter two, with a not-terribly-well structured collection of facts about data organization, drive types, and so forth, with varying levels of detail. Chapter three addresses different factors and problems in hard disk data acquisition, although the inventory is neither complete nor fully explained. Part two deals with the analysis of drive volumes or partitions, with chapter four outlining basic structures. DOS (FAT [File Allocation Table] and NTFS) and Apple partition details are discussed in chapter five. Chapter six reviews various UNIX partitions. Multi-disk systems, such as RAID (Redundant Array of Inexpensive Disks) are covered in chapter seven. Part three delves into the data structures of the file system itself. Chapter eight introduces concepts used in considering file systems. Details of the FAT system are in chapters nine and ten. A very detailed explanation of the disk and file structures of the NTFS system, as well as considerations for analysis, is provided in chapters eleven to thirteen. The Linux Ext2 and Ext3 structures are discussed in chapters fourteen and fifteen. Chapters sixteen and seventeen cover the UFS1 and UFS2 schemes, found primarily in BSD (Berkeley Systems Distribution) derived versions. This book does provide a wealth of detail, once it gets into the specifics of partitions and structures. The introductory material, writing, and technical level are quite uneven, which makes it difficult to use. Still, those seriously involved with the data recovery aspect of digital forensics should consider this work a valuable resource. copyright Robert M. Slade, 2005 BKFSFRAN.RVW 20050608 ====================== (quote inserted randomly by Pegasus Mailer) rslade@private slade@private rslade@private I don't yet have a solution, but I have a new name for the problem. - Ross A. Leo, CISSPforum, 20050712 http://victoria.tc.ca/techrev or http://sun.soci.niu.edu/~rslade _________________________________________ Attend ToorCon Sept 16-18th, 2005 Convention Center San Diego, California www.toorcon.org
This archive was generated by hypermail 2.1.3 : Thu Aug 11 2005 - 00:42:32 PDT