首页  软件  游戏  图书  电影  电视剧

请输入您要查询的图书:

 

图书 ALTERNATE DATA STORAGE FORENSICS
内容
编辑推荐

Learn to pull ?digital fingerprints? from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at ?not yet every day? devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.

内容推荐

At a conference, I had a conversation with a federal agent about a child pornography case that he had worked on. He and his colleagues had raided the suspect's home as usual, but noticed that the suspect was strangely unalarmed and even smirking as the agents copied all the data from his computers. He continuously proclaimed his innocence. The agent remembered a presentation I had given about iPods being used to store data and noticed that the suspect had an iPod on his desk. According to the warrant served on the suspect, the agents were permitted to seize all electronic equipment capable of storing data. The agent picked up the iPod, and suddenly the suspect's demeanor and attitude changed-he turned pale and became agitated. Before the raid was finished, the suspect had confessed that he routinely erased his computers' hard drives after transferring all of his child pornography photographs to his iPod. The evidence resulted in a conviction.

目录

Chapter 1 Digital Forensics and Analyzing Data

Introduction

The Evolution of Computer Forensics

Phases of Digital Forensics

 Collection

Preparation

Difficulties When Collecting

Evidence from Nontraditional Devices

Hardware Documentation Difficulties

Difficulties When Collecting

Data from Raid Arrays, SAN, and NAS Devices

Difficulties When Collecting

Data from Virtual Machines

Difficulties When Conducting

Memory Acquisition and Analysis

 Examination

Utility of Hash Sets

Difficulties Associated with

Examining a System with Full Disk Encryption

Alternative Forensic Processes

 Analysis

Analysis of a Single Computer

Analysis of an Enterprise Event

Tools for Data Analysis

 Reporting

Summary

References

Solutions Fast Track

Frequently Asked Questions

Chapter 2 Seizure of Digital Information

Chapter 3 Introduction to Handheld Forensics

Chapter 4 PDA,Blackberry,and iPod Forensic Anlysis

Chapter 5 E-mail Forensics

Chapter 6 Router Forensics

Chapter 7 Legal Issues of Intercepting WiFi Transmissions

Chapter 8 CD and DVD Forensics

Chapter 9 MP3 Forensics

Index

标签
缩略图
书名 ALTERNATE DATA STORAGE FORENSICS
副书名
原作名
作者 TYLER COHEN
译者
编者
绘者
出版社 SYNGRESS PUBLISHING
商品编码(ISBN) 9781597491631
开本 16开
页数 315
版次 1
装订 平装
字数
出版时间 2007-01-01
首版时间 2007-01-01
印刷时间 2007-01-01
正文语种
读者对象 青年(14-20岁),研究人员,普通成人
适用范围
发行范围 公开发行
发行模式 实体书
首发网站
连载网址
图书大类
图书小类
重量 0.586
CIP核字
中图分类号
丛书名
印张 19.6875
印次 1
出版地 美国
236
191
19
整理
媒质 图书
用纸 普通纸
是否注音
影印版本 原版
出版商国别 US
是否套装 单册
著作权合同登记号
版权提供者
定价
印数
出品方
作品荣誉
主角
配角
其他角色
一句话简介
立意
作品视角
所属系列
文章进度
内容简介
作者简介
目录
文摘
安全警示 适度休息有益身心健康,请勿长期沉迷于阅读小说。
随便看

 

兰台网图书档案馆全面收录古今中外各种图书,详细介绍图书的基本信息及目录、摘要等图书资料。

 

Copyright © 2004-2025 xlantai.com All Rights Reserved
更新时间:2025/5/16 15:01:06