Documentation Source Text

Check-in [97f6d1477c]

Many hyperlinks are disabled.
Use anonymous login to enable hyperlinks.

Comment:Add the Sanderson book to the books.html page.
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA3-256: 97f6d1477cf99ab8d942f623f4095657fc018bf69e87288724b4471f57b2f801
User & Date: drh 2018-06-01 17:41:28
Add the final date and various hashes for the 3.24.0 release. check-in: c300836d83 user: drh tags: trunk
Add the Sanderson book to the books.html page. check-in: 97f6d1477c user: drh tags: trunk
Typo fixes. check-in: db85f0efae user: drh tags: trunk
Hide Diffs Side-by-Side Diffs Ignore Whitespace Patch

Added images/books/sanderson2018.jpg.

cannot compute difference between binary files

Changes to pages/

     1      1   <title>Books About SQLite</title>
     2      2   <tcl>hd_keywords {books about SQLite}</tcl>
     3      3   
     4      4   <h1 align=center>Books About SQLite</h1>
            5  +
            6  +<hr>
            7  +<table border=0><tr><td valign=top><img src="images/books/sanderson2018.jpg" style="border:44px solid white;">
            8  +<td valign=top>
            9  +<h2>SQLite Forensics (2018)</h2>
           10  +
           11  +<p>
           12  +Author: Paul Sanderson<br>
           13  +Publisher: <a href=''>Amazon</a>
           14  +
           15  +<p>
           16  +This text by noted digital forensics expert, Paul Sanderson, provides
           17  +investigators with low-level technical details useful in analysing
           18  +SQLite database files.
           19  +
           20  +<p>
           21  +Every computer and phone uses hundreds of SQLite databases and there are
           22  +over one trillion SQLite databases in active use. Hence, the importance
           23  +of examining the data held in these databases in an
           24  +investigation, including deleted data when possible, is paramount. This
           25  +book fully explains the format of the SQLite database file. It shows how
           26  +records are encoded, how to decode them manually and how to decode
           27  +records that are partially overwritten. It also describe how the
           28  +workings of SQLite, and in particular the journal and WAL, can be used
           29  +to ascertain what has happened in a manner that cannot be determined
           30  +from the data alone. The book covers basic SQL queries and how they can
           31  +be used to create a custom report that includes data from different
           32  +tables, and shows how one can use SQL queries to test hypothesises about
           33  +the relationships of data in different tables. 
           34  +<p>
           35  +This book is aimed mainly at
           36  +forensic practitioners, and it is assumed that the reader has some basic
           37  +knowledge of computer forensics; it will also be of interest to computer
           38  +professionals in general particularly those who have an interest in the
           39  +SQLite file format.
           40  +</table>
           41  +
     5     42   
     6     43   <hr>
     7     44   <table border=0><tr><td valign=top><img src="images/books/darocha2016.jpg">
     8     45   <td valign=top>
     9     46   <h2>Learning SQLite for iOS (2016)</h2>
    10     47   
    11     48   <p>