Skip to Main Content
Operating System Forensics
book

Operating System Forensics

by Ric Messier
November 2015
Intermediate to advanced content levelIntermediate to advanced
386 pages
12h 50m
English
Syngress
Content preview from Operating System Forensics
Chapter 13

Reporting

Abstract

Using open source tools to collect memory and analyze it as part of a forensic investigation.

Keywords

operating systems
forensics
operating environments

INFORMATION INCLUDED IN THIS CHAPTER:

Writing Style
Artifacts
Reporting Considerations
Reporting Requirements
Report Samples
Testifying

Introduction

Once you have completed your investigation, no matter what type of investigation it is, you will probably have to generate a report. In other words, you want to convey your findings in a way that can be easily understood. You will probably have acquired a fair amount of data and you will not want to simply hand it all over. One of your tasks as a forensic investigator or incident responder is performing some ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Computer Forensics InfoSec Pro Guide

Computer Forensics InfoSec Pro Guide

David Cowen
Windows Forensics Cookbook

Windows Forensics Cookbook

Scar de Courcier, Oleg Skulkin
Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems

Eoghan Casey, Cameron H. Malin, James M. Aquilina

Publisher Resources

ISBN: 9780128019634