资源说明:Who Should Read
This Book
For those of you who have read my first book,
Investigator’s Guide to
Steganography
, you will notice a similar style and organization in this
book. I did my best to make this book readable for anyone, but it is, of
course, tailored to the forensic investigator, the private investigator with
technical skills, and the IT security professional. The flow of the book is
designed to take you from basic to advanced understanding. It does not
necessarily have to be read in order, but that is probably the best approach
to take if you’re a beginner or haven’t looked at the technology in a
while. I’m a big believer in keeping information in context: showing where
technology came from and why it is being used, before approaching the
subject of forensics. The book is crafted along those lines of thought.
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。