top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Alternate data storage forensics [[electronic resource] /] / Amber Schroader, Tyler Cohen
Alternate data storage forensics [[electronic resource] /] / Amber Schroader, Tyler Cohen
Autore Cohen Tyler
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (337 p.)
Disciplina 363.25968
Altri autori (Persone) SchroaderAmber
Soggetto topico Information storage and retrieval systems
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 1-281-07709-7
9786611077099
0-08-055475-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Alternate Data Storage Forensics; Copyright Page; Contents; Chapter 1. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Seizure of Digital Information; Introduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary
Works CitedSolutions Fast Track; Frequently Asked Questions; Chapter 3. Introduction to Handheld Forensics; Digital Forensics; What Is the Handheld Forensic Impact?; Cellular Handling; Evidence Preservation; Maintain a Forensic Data Connection; Analysis and Reporting; Chapter 4. PDA, Blackberry, and iPod Forensic Analysis; Introduction; PDA Forensics; PDA Investigative Tips; Expansion Sleeve Removed; Deploying PDA Forensic Tools; Introduction to the Blackberry; Security for Stored Data; Forensic Examination of a Blackberry; Attacking The Blackberry; Securing the Blackberry (RIM)
iPod ForensicsMisuse of an iPod; iPod Investigation; The iPod and Windows; The iPod and Linux; User Accounts; Deleted Files; iPod Time Issues; Registry Key Containing the iPod's USB/Firewire Serial Number; iPod Tools; Summary; Notes; Solutions Fast Track; Frequently Asked Questions; Chapter 5. E-mail Forensics; Introduction; Where to Start?; Forensic Acquisition; Processing Local Mail Archives; Using Paraben's Network E-mail Examiner (NEMX); Chapter 6. Router Forensics; Introduction; Network Forensics; Searching for Evidence; An Overview of Routers; Hacking Routers; Investigating Routers
Incident ResponseSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Freyuently Asked Questions; Chapter 8. CD and DVD Forensics; Physical Characteritics of CD and DVD Media; CD Features; CD and DVD Logical Structure; Space Allocation by CD and DVD File Systems; Disc Accessibility Problems; Forensic Binary Images; Collecting CD and DVD Evidence
Preparing for Disc ExaminationChapter 9. MP3 Forensics; Introduction; History; Why Is an iPod Considered Alternative Media?; Imaging and Hashing; Hardware vs . Nonhardware Imaging; Types of iPods; File Systems; "Hacking Tools" and Encrypted Home Directories; Evidence: Normal vs . Not Normal; Analysis Tools; Summary; Index
Record Nr. UNINA-9910458827103321
Cohen Tyler  
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Alternate data storage forensics [[electronic resource] /] / Amber Schroader, Tyler Cohen
Alternate data storage forensics [[electronic resource] /] / Amber Schroader, Tyler Cohen
Autore Cohen Tyler
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (337 p.)
Disciplina 363.25968
Altri autori (Persone) SchroaderAmber
Soggetto topico Information storage and retrieval systems
Computer crimes
ISBN 1-281-07709-7
9786611077099
0-08-055475-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Alternate Data Storage Forensics; Copyright Page; Contents; Chapter 1. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Seizure of Digital Information; Introduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary
Works CitedSolutions Fast Track; Frequently Asked Questions; Chapter 3. Introduction to Handheld Forensics; Digital Forensics; What Is the Handheld Forensic Impact?; Cellular Handling; Evidence Preservation; Maintain a Forensic Data Connection; Analysis and Reporting; Chapter 4. PDA, Blackberry, and iPod Forensic Analysis; Introduction; PDA Forensics; PDA Investigative Tips; Expansion Sleeve Removed; Deploying PDA Forensic Tools; Introduction to the Blackberry; Security for Stored Data; Forensic Examination of a Blackberry; Attacking The Blackberry; Securing the Blackberry (RIM)
iPod ForensicsMisuse of an iPod; iPod Investigation; The iPod and Windows; The iPod and Linux; User Accounts; Deleted Files; iPod Time Issues; Registry Key Containing the iPod's USB/Firewire Serial Number; iPod Tools; Summary; Notes; Solutions Fast Track; Frequently Asked Questions; Chapter 5. E-mail Forensics; Introduction; Where to Start?; Forensic Acquisition; Processing Local Mail Archives; Using Paraben's Network E-mail Examiner (NEMX); Chapter 6. Router Forensics; Introduction; Network Forensics; Searching for Evidence; An Overview of Routers; Hacking Routers; Investigating Routers
Incident ResponseSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Freyuently Asked Questions; Chapter 8. CD and DVD Forensics; Physical Characteritics of CD and DVD Media; CD Features; CD and DVD Logical Structure; Space Allocation by CD and DVD File Systems; Disc Accessibility Problems; Forensic Binary Images; Collecting CD and DVD Evidence
Preparing for Disc ExaminationChapter 9. MP3 Forensics; Introduction; History; Why Is an iPod Considered Alternative Media?; Imaging and Hashing; Hardware vs . Nonhardware Imaging; Types of iPods; File Systems; "Hacking Tools" and Encrypted Home Directories; Evidence: Normal vs . Not Normal; Analysis Tools; Summary; Index
Record Nr. UNINA-9910784622703321
Cohen Tyler  
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Alternate data storage forensics / / Amber Schroader, Tyler Cohen
Alternate data storage forensics / / Amber Schroader, Tyler Cohen
Autore Cohen Tyler
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (337 p.)
Disciplina 363.25968
Altri autori (Persone) SchroaderAmber
Soggetto topico Information storage and retrieval systems
Computer crimes
ISBN 1-281-07709-7
9786611077099
0-08-055475-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Alternate Data Storage Forensics; Copyright Page; Contents; Chapter 1. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Seizure of Digital Information; Introduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary
Works CitedSolutions Fast Track; Frequently Asked Questions; Chapter 3. Introduction to Handheld Forensics; Digital Forensics; What Is the Handheld Forensic Impact?; Cellular Handling; Evidence Preservation; Maintain a Forensic Data Connection; Analysis and Reporting; Chapter 4. PDA, Blackberry, and iPod Forensic Analysis; Introduction; PDA Forensics; PDA Investigative Tips; Expansion Sleeve Removed; Deploying PDA Forensic Tools; Introduction to the Blackberry; Security for Stored Data; Forensic Examination of a Blackberry; Attacking The Blackberry; Securing the Blackberry (RIM)
iPod ForensicsMisuse of an iPod; iPod Investigation; The iPod and Windows; The iPod and Linux; User Accounts; Deleted Files; iPod Time Issues; Registry Key Containing the iPod's USB/Firewire Serial Number; iPod Tools; Summary; Notes; Solutions Fast Track; Frequently Asked Questions; Chapter 5. E-mail Forensics; Introduction; Where to Start?; Forensic Acquisition; Processing Local Mail Archives; Using Paraben's Network E-mail Examiner (NEMX); Chapter 6. Router Forensics; Introduction; Network Forensics; Searching for Evidence; An Overview of Routers; Hacking Routers; Investigating Routers
Incident ResponseSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Freyuently Asked Questions; Chapter 8. CD and DVD Forensics; Physical Characteritics of CD and DVD Media; CD Features; CD and DVD Logical Structure; Space Allocation by CD and DVD File Systems; Disc Accessibility Problems; Forensic Binary Images; Collecting CD and DVD Evidence
Preparing for Disc ExaminationChapter 9. MP3 Forensics; Introduction; History; Why Is an iPod Considered Alternative Media?; Imaging and Hashing; Hardware vs . Nonhardware Imaging; Types of iPods; File Systems; "Hacking Tools" and Encrypted Home Directories; Evidence: Normal vs . Not Normal; Analysis Tools; Summary; Index
Record Nr. UNINA-9910828815903321
Cohen Tyler  
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui