LEADER 05057nam 2200649Ia 450 001 9910828815903321 005 20230120004911.0 010 $a1-281-07709-7 010 $a9786611077099 010 $a0-08-055475-X 035 $a(CKB)1000000000383541 035 $a(EBL)330199 035 $a(OCoLC)162131594 035 $a(SSID)ssj0000101565 035 $a(PQKBManifestationID)11127223 035 $a(PQKBTitleCode)TC0000101565 035 $a(PQKBWorkID)10061565 035 $a(PQKB)11285768 035 $a(Au-PeEL)EBL330199 035 $a(CaPaEBR)ebr10196339 035 $a(CaONFJC)MIL107709 035 $a(CaSebORM)9780080554754 035 $a(MiAaPQ)EBC330199 035 $a(EXLCZ)991000000000383541 100 $a20071015d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAlternate data storage forensics /$fAmber Schroader, Tyler Cohen 205 $a1st edition 210 $aBurlington, MA $cSyngress Pub.$dc2007 215 $a1 online resource (337 p.) 300 $aDescription based upon print version of record. 311 $a1-59749-163-2 327 $aFront Cover; Alternate Data Storage Forensics; Copyright Page; Contents; Chapter 1. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Seizure of Digital Information; Introduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary 327 $aWorks CitedSolutions Fast Track; Frequently Asked Questions; Chapter 3. Introduction to Handheld Forensics; Digital Forensics; What Is the Handheld Forensic Impact?; Cellular Handling; Evidence Preservation; Maintain a Forensic Data Connection; Analysis and Reporting; Chapter 4. PDA, Blackberry, and iPod Forensic Analysis; Introduction; PDA Forensics; PDA Investigative Tips; Expansion Sleeve Removed; Deploying PDA Forensic Tools; Introduction to the Blackberry; Security for Stored Data; Forensic Examination of a Blackberry; Attacking The Blackberry; Securing the Blackberry (RIM) 327 $aiPod ForensicsMisuse of an iPod; iPod Investigation; The iPod and Windows; The iPod and Linux; User Accounts; Deleted Files; iPod Time Issues; Registry Key Containing the iPod's USB/Firewire Serial Number; iPod Tools; Summary; Notes; Solutions Fast Track; Frequently Asked Questions; Chapter 5. E-mail Forensics; Introduction; Where to Start?; Forensic Acquisition; Processing Local Mail Archives; Using Paraben's Network E-mail Examiner (NEMX); Chapter 6. Router Forensics; Introduction; Network Forensics; Searching for Evidence; An Overview of Routers; Hacking Routers; Investigating Routers 327 $aIncident ResponseSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Freyuently Asked Questions; Chapter 8. CD and DVD Forensics; Physical Characteritics of CD and DVD Media; CD Features; CD and DVD Logical Structure; Space Allocation by CD and DVD File Systems; Disc Accessibility Problems; Forensic Binary Images; Collecting CD and DVD Evidence 327 $aPreparing for Disc ExaminationChapter 9. MP3 Forensics; Introduction; History; Why Is an iPod Considered Alternative Media?; Imaging and Hashing; Hardware vs . Nonhardware Imaging; Types of iPods; File Systems; "Hacking Tools" and Encrypted Home Directories; Evidence: Normal vs . Not Normal; Analysis Tools; Summary; Index 330 $aLearn to pull "digital fingerprints? from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of AD 606 $aInformation storage and retrieval systems 606 $aComputer crimes 615 0$aInformation storage and retrieval systems. 615 0$aComputer crimes. 676 $a363.25968 676 $a363.25968 700 $aCohen$b Tyler$01657159 701 $aSchroader$b Amber$01657160 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910828815903321 996 $aAlternate data storage forensics$94010445 997 $aUNINA