LEADER 05924nam 2200817Ia 450 001 9910827008003321 005 20200520144314.0 010 $a1-119-20345-7 010 $a1-280-59139-0 010 $a9786613621221 010 $a1-118-28268-X 010 $a1-118-28731-2 035 $a(CKB)2670000000167012 035 $a(EBL)822015 035 $a(OCoLC)767974727 035 $a(SSID)ssj0000661677 035 $a(PQKBManifestationID)11463238 035 $a(PQKBTitleCode)TC0000661677 035 $a(PQKBWorkID)10710985 035 $a(PQKB)11651203 035 $a(Au-PeEL)EBL822015 035 $a(CaPaEBR)ebr10560535 035 $a(CaONFJC)MIL362122 035 $a(CaSebORM)9781118273661 035 $a(MiAaPQ)EBC822015 035 $a(OCoLC)810071460 035 $a(OCoLC)ocn810071460 035 $a(EXLCZ)992670000000167012 100 $a20111123d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber forensics $efrom data to digital evidence /$fAlbert J. Marcella, Jr., Frederic Guillossou 205 $a1st edition 210 $aHoboken, NJ $cWiley$d2012 215 $a1 online resource (366 p.) 225 1 $aWiley Corporate F&A series 300 $aDescription based upon print version of record. 311 $a1-118-27366-4 320 $aIncludes bibliographical references and index. 327 $aCyber Forensics: From Data to Digital Evidence; Contents; Preface; Acknowledgments; Chapter 1: The Fundamentals of Data; Base 2 Numbering System: Binary and Character Encoding; Communication in a Two-State Universe; Electricity and Magnetism; Building Blocks: The Origins of Data; Growing the Building Blocks of Data; Moving Beyond Base 2; American Standard Code for Information Interchange; Character Codes: The Basis for Processing Textual Data; Extended ASCII and Unicode; Summary; Notes; Chapter 2: Binary to Decimal; American Standard Code for Information Interchange; Computer as a Calculator 327 $aWhy Is This Important in Forensics?Data Representation; Converting Binary to Decimal; Conversion Analysis; A Forensic Case Example: An Application of the Math; Decimal to Binary: Recap for Review; Summary; Chapter 3: The Power of HEX: Finding Slivers of Data; What the HEX?; Bits and Bytes and Nibbles; Nibbles and Bits; Binary to HEX Conversion; Binary (HEX) Editor; The Needle within the Haystack; Summary; Notes; Chapter 4: Files; Opening; Files, File Structures, and File Formats; File Extensions; Changing a File's Extension to Evade Detection; Files and the HEX Editor; File Signature 327 $aASCII Is Not Text or HEXValue of File Signatures; Complex Files: Compound, Compressed, and Encrypted Files; Why Do Compound Files Exist?; Compressed Files; Forensics and Encrypted Files; The Structure of Ciphers; Summary; Notes; Appendix 4A: Common File Extensions; Appendix 4B: File Signature Database; Appendix 4C: Magic Number Definition; Appendix 4D: Compound Document Header; Chapter 5: The Boot Process and the Master Boot Record (MBR); Booting Up; Primary Functions of the Boot Process; Forensic Imaging and Evidence Collection; Summarizing the BIOS; BIOS Setup Utility: Step by Step 327 $aThe Master Boot Record (MBR)Partition Table; Hard Disk Partition; Summary; Notes; Chapter 6: Endianness and the Partition Table; The Flavor of Endianness; Endianness; The Origins of Endian; Partition Table within the Master Boot Record; Summary; Notes; Chapter 7: Volume versus Partition; Tech Review; Cylinder, Head, Sector, and Logical Block Addressing; Volumes and Partitions; Summary; Notes; Chapter 8: File Systems-FAT 12/16; Tech Review; File Systems; Metadata; File Allocation Table (FAT) File System; Slack; HEX Review Note; Directory Entries; File Allocation Table (FAT) 327 $aHow Is Cluster Size Determined?Expanded Cluster Size; Directory Entries and the FAT; FAT Filing System Limitations; Directory Entry Limitations; Summary; Appendix 8A: Partition Table Fields; Appendix 8B: File Allocation Table Values; Appendix 8C: Directory Entry Byte Offset Description; Appendix 8D: FAT 12/16 Byte Offset Values; Appendix 8E: FAT 32 Byte Offset Values; Appendix 8F: The Power of 2; Chapter 9: File Systems-NTFS and Beyond; New Technology File System; Partition Boot Record; Master File Table; NTFS Summary; exFAT; Alternative Filing System Concepts; Summary; Notes 327 $aAppendix 9A: Common NTFS System Defined Attributes 330 $aAn explanation of the basic principles of data This book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies. The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information. It inlcudes practical exa 410 0$aWiley corporate F & A. 606 $aForensic sciences$xTechnological innovations 606 $aElectronic evidence 606 $aEvidence, Criminal 606 $aCriminal investigation 606 $aComputer crimes$xInvestigation 615 0$aForensic sciences$xTechnological innovations. 615 0$aElectronic evidence. 615 0$aEvidence, Criminal. 615 0$aCriminal investigation. 615 0$aComputer crimes$xInvestigation. 676 $a363.250285 686 $aBUS001000$2bisacsh 700 $aMarcella$b Albert J$01682943 701 $aGuillossou$b Frederic$f1970-$01682944 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910827008003321 996 $aCyber forensics$94053385 997 $aUNINA