2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2013) : Hong Kong, 21-22 November 2013 / / IEEE |
Pubbl/distr/stampa | IEEE |
Disciplina | 363.25/968 |
Soggetto topico |
Computer crimes - Investigation
Forensic engineering |
ISBN | 1-4799-4061-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering
2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) Systematic Approaches to Digital Forensic Engineering |
Record Nr. | UNISA-996279799303316 |
IEEE | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2013) : Hong Kong, 21-22 November 2013 / / IEEE |
Pubbl/distr/stampa | IEEE |
Disciplina | 363.25/968 |
Soggetto topico |
Computer crimes - Investigation
Forensic engineering |
ISBN |
9781479940615
1479940615 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering
2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) Systematic Approaches to Digital Forensic Engineering |
Record Nr. | UNINA-9910135616303321 |
IEEE | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The art of memory forensics [[electronic resource] ] : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh... [et al] |
Pubbl/distr/stampa | Hoboken, : Wiley, 2014 |
Descrizione fisica | xxiii, 886p. ; : ill |
Disciplina |
363.25
363.25/968 363.25968 |
Altri autori (Persone) | LighMichael Hale |
Soggetto topico |
Malware (Computer software) - Security measures
Computer security Computer networks Computer crimes |
Soggetto genere / forma | Electronic books. |
ISBN | 9781118825044 : (ebk : EbookCentral) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910464349503321 |
Hoboken, : Wiley, 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The basics of digital forensics [[electronic resource] ] : the primer for getting started in digital forensics / / John Sammons |
Autore | Sammons John |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Mass., : Syngress, c2012 |
Descrizione fisica | 1 online resource (1 v.) : ill |
Disciplina | 363.25/968 |
Soggetto topico | Computer crimes - Investigation |
Soggetto genere / forma | Electronic books. |
ISBN | 1-59749-662-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Key technical concepts -- Labs and tools -- Collecting evidence -- Windows system artifacts -- Antiforensics -- Legal -- Internet and e-mail -- Network forensics -- Mobile device forensics -- Looking ahead. |
Record Nr. | UNINA-9910467827803321 |
Sammons John
![]() |
||
Waltham, Mass., : Syngress, c2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The basics of digital forensics [[electronic resource] ] : the primer for getting started in digital forensics / / John Sammons |
Autore | Sammons John |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Mass., : Syngress, c2012 |
Descrizione fisica | 1 online resource (1 v.) : ill |
Disciplina | 363.25/968 |
Soggetto topico | Computer crimes - Investigation |
ISBN | 1-59749-662-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Key technical concepts -- Labs and tools -- Collecting evidence -- Windows system artifacts -- Antiforensics -- Legal -- Internet and e-mail -- Network forensics -- Mobile device forensics -- Looking ahead. |
Record Nr. | UNINA-9910795117903321 |
Sammons John
![]() |
||
Waltham, Mass., : Syngress, c2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CD and DVD forensics [[electronic resource] /] / Paul Crowley ; technical editor, Dave Kleiman |
Autore | Crowley Paul |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2007 |
Descrizione fisica | 1 online resource (321 p.) |
Disciplina | 363.25/968 |
Soggetto topico |
Computer crimes - Investigation
Evidence, Criminal Optical disks - Evaluation |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-07299-0
9786611072995 0-08-050080-3 1-59749-162-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; CD and DVD Forensics; Copyright Page; Contents; Introduction; Chapter 1. Physical Characteristics of CD and DVD Media; CD Features; CD Sizes and Shapes; CD and DVD Types; CD and DVD Colors; CD-R Dyes; Information Storage on CDs and DVDs; CD and DVD Organization and Terminology; CD and DVD Sectors; R-W Subchannels; CD and DVD Differences; CD-ROM Manufacturing Process; Inside a CD-ROM Drive; External Interfaces; Drive Firmware; Chapter 2. CD and DVD Logical Structure; Writing to a CD or DVD; Logical File Systems; CD and DVD File Systems; Space Allocation by CD and DVD File Systems
Disc Accessibility Problems Chapter 3. Forensic Binary Images; Reproducing Forensic Images; Chapter 4. Collecting CD and DVD Evidence; Recognizing CD and DVD Media; Collection Considerations; Marking Discs; Transporting Discs; Documenting and Fingerprinting Discs; Officer Safety; Chapter 5. Preparing for Disc Examination; Forensic Hardware; Forensic Software; Forensic Workstation; Validation; Disc Triage; Chapter 6. CD/DVD Inspector - The Basics; CD/DVD Inspector Installation; CD/DVD Inspector Facts; Getting Started with CD/DVD Inspector; Searching; User Preferences; Options Settings Disc Memory Settings The Analysis Tool; The Hardware Information Display; The Volume Information Display; HFS and HFS+ Volume Information; HSG Volume Information; UDF Volume Information; Disc Reports; Chapter 7. Using CD/DVD Inspector; Examining a Disc-A Step-by-step Guide; Other Examination Tasks; Chapter 8. Advanced Tasks with CD/DVD Inspector; Using Hash Matching and MD5 Hashes; Space Utilization Analysis; ISO-9660 Directory Analysis; Unknown Data Track Issues; Chapter 9. Reporting Your Findings; Full List of All Files on the Media; Image Report(s); Analysis Report Chapter 10. Things to Keep In Mind Appendix A. Disc Swap Drive Modification; Appendix B. Downloading Additional Materials; Glossary; Index |
Record Nr. | UNINA-9910450898103321 |
Crowley Paul
![]() |
||
Rockland, MA, : Syngress Publishing, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CD and DVD forensics [[electronic resource] /] / Paul Crowley ; technical editor, Dave Kleiman |
Autore | Crowley Paul |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2007 |
Descrizione fisica | 1 online resource (321 p.) |
Disciplina | 363.25/968 |
Soggetto topico |
Computer crimes - Investigation
Evidence, Criminal Optical disks - Evaluation |
ISBN |
1-281-07299-0
9786611072995 0-08-050080-3 1-59749-162-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; CD and DVD Forensics; Copyright Page; Contents; Introduction; Chapter 1. Physical Characteristics of CD and DVD Media; CD Features; CD Sizes and Shapes; CD and DVD Types; CD and DVD Colors; CD-R Dyes; Information Storage on CDs and DVDs; CD and DVD Organization and Terminology; CD and DVD Sectors; R-W Subchannels; CD and DVD Differences; CD-ROM Manufacturing Process; Inside a CD-ROM Drive; External Interfaces; Drive Firmware; Chapter 2. CD and DVD Logical Structure; Writing to a CD or DVD; Logical File Systems; CD and DVD File Systems; Space Allocation by CD and DVD File Systems
Disc Accessibility Problems Chapter 3. Forensic Binary Images; Reproducing Forensic Images; Chapter 4. Collecting CD and DVD Evidence; Recognizing CD and DVD Media; Collection Considerations; Marking Discs; Transporting Discs; Documenting and Fingerprinting Discs; Officer Safety; Chapter 5. Preparing for Disc Examination; Forensic Hardware; Forensic Software; Forensic Workstation; Validation; Disc Triage; Chapter 6. CD/DVD Inspector - The Basics; CD/DVD Inspector Installation; CD/DVD Inspector Facts; Getting Started with CD/DVD Inspector; Searching; User Preferences; Options Settings Disc Memory Settings The Analysis Tool; The Hardware Information Display; The Volume Information Display; HFS and HFS+ Volume Information; HSG Volume Information; UDF Volume Information; Disc Reports; Chapter 7. Using CD/DVD Inspector; Examining a Disc-A Step-by-step Guide; Other Examination Tasks; Chapter 8. Advanced Tasks with CD/DVD Inspector; Using Hash Matching and MD5 Hashes; Space Utilization Analysis; ISO-9660 Directory Analysis; Unknown Data Track Issues; Chapter 9. Reporting Your Findings; Full List of All Files on the Media; Image Report(s); Analysis Report Chapter 10. Things to Keep In Mind Appendix A. Disc Swap Drive Modification; Appendix B. Downloading Additional Materials; Glossary; Index |
Record Nr. | UNINA-9910784273403321 |
Crowley Paul
![]() |
||
Rockland, MA, : Syngress Publishing, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
Autore | Akhgar Babak |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] |
Descrizione fisica | 1 online resource (xxiii, 282 pages) : illustrations |
Disciplina | 363.25/968 |
Collana | Special needs offenders closeup |
Soggetto topico |
Computer crimes - Investigation
Cyberterrorism - Investigation |
ISBN | 0-12-800811-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction
Some Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture Verification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders Recovering Deleted Partitions |
Record Nr. | UNINA-9910665418903321 |
Akhgar Babak
![]() |
||
Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] |
Descrizione fisica | 1 online resource (xxiii, 282 pages) : illustrations |
Disciplina | 363.25/968 |
Soggetto topico |
Computer crimes - Investigation
Cyberterrorism - Investigation |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-800811-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction
Some Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture Verification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders Recovering Deleted Partitions |
Record Nr. | UNINA-9910458578403321 |
Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber crime investigations [[electronic resource] ] : bridging the gaps between security professionals, law enforcement, and prosecutors / / Anthony Reyes ... [et. al] |
Autore | Reyes Anthony |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2007 |
Descrizione fisica | 1 online resource (433 p.) |
Disciplina | 363.25/968 |
Soggetto topico | Computer crimes - Investigation |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-06022-4
9786611060220 0-08-055363-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors; Copyright Page; Contents; Chapter 1. The Problem at Hand; Introduction; The Gaps in Cyber Crime Law; Unveiling the Myths Behind Cyber Crime; Prioritizing Evidence; Setting the Bar Too High; Summary; Works Referenced; Solutions Fast Track; Frequently Asked Questions; Chapter 2. "Computer Crime" Discussed; Introduction; Examining "Computer Crime" Definitions; Dissecting "Computer Crime"; Using Clear Language to Bridge the Gaps; Summary; Works Referenced
Solutions Fast TrackFrequently Asked Questions; Chapter 3. Preparing for Prosecution and Testifying; Introduction; Common Misconceptions; Chain of Custody; Keys to Effective Testimony; Differences between Civil and Criminal Cases; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Cyber Investigative Roles; Introduction; Understanding Your Role as a Cyber Crime Investigator; The Role of Law Enforcement Officers; The Role of the Prosecuting Attorney; Summary; Solutions Fast Track; Frequently Asked Questions; Works Referenced Chapter 5. Incident Response: Live Forensics and InvestigationsIntroduction; Postmortmem versus Live Forensics; Today's Live Methods; Case Study: Live versus Postmortem; Computer Analysis for the Hacker Defender Program; Network Analysis; Summary; Special Thanks; References; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions Chapter 7. Seizure of Digital InformationIntroduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Conducting Cyber Investigations; Introduction; Demystifying Computer/Cyber Crime; Understanding IP Addresses; The Explosion of Networking; The Explosion of Wireless Networks; Interpersonal Communication SummarySolutions Fast Track; Frequently Asked Questions; Chapter 9. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Cyber Crime Prevention; Introduction; Ways to Prevent Cyber Crime Targeted at You; Ways to Prevent Cyber Crime Targeted at the Family; Ways to Prevent Cyber Crime Targeted at Personal Property; Ways to Prevent Cyber Crime Targeted at a Business; Ways to Prevent Cyber Crime Targeted at an Organization Ways to Prevent Cyber Crime Targeted at a Government Agency |
Record Nr. | UNINA-9910458824303321 |
Reyes Anthony
![]() |
||
Rockland, MA, : Syngress Publishing, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|