top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2018 6th International Symposium on Digital Forensic and Security : 22-25 March 2018, Antalya, Turkey / / Institute of Electrical and Electronics Engineers. Turkey Section
2018 6th International Symposium on Digital Forensic and Security : 22-25 March 2018, Antalya, Turkey / / Institute of Electrical and Electronics Engineers. Turkey Section
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Descrizione fisica 1 online resource (91 pages)
Disciplina 363.25968
Soggetto topico Computer crimes - Investigation
Computer security
ISBN 1-5386-3449-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996280723103316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2018 6th International Symposium on Digital Forensic and Security : 22-25 March 2018, Antalya, Turkey / / Institute of Electrical and Electronics Engineers. Turkey Section
2018 6th International Symposium on Digital Forensic and Security : 22-25 March 2018, Antalya, Turkey / / Institute of Electrical and Electronics Engineers. Turkey Section
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Descrizione fisica 1 online resource (91 pages)
Disciplina 363.25968
Soggetto topico Computer crimes - Investigation
Computer security
ISBN 1-5386-3449-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910280925103321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 357 p. 74 illus. in color.)
Disciplina 363.25968
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-319-24123-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- THEMES AND ISSUES -- A TALE OF TWO TRACES - DIPLOMATICS AND FORENSICS -- 1. Introduction -- 1.1 Causality as a Foundation of Science -- 1.2 Diplomatics -- 1.3 Archival Science and Public Records -- 1.4 Digital Records -- 1.5 Digital Diplomatics -- 1.6 Forensic Science -- 1.7 Digital Forensics -- 2. Digital Diplomatics and Forensics -- 2.1 Case 1 Background -- 2.2 Case 2 Background -- 2.3 Admitting the Documents -- 2.4 Related Information on Records -- 3. Case Resolution -- 3.1 Case 1 -- 3.2 Case 2 -- 4. Implications and the Path Forward -- 4.1 Implications -- 4.2 The Path Forward -- 5. Conclusions -- References -- NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS -- 1. Motivation -- 2. Related Work -- 3. Carrier's Work -- 3.1 History Duration -- 3.2 Primitive Storage System Configuration -- 3.3 Primitive Event System Configuration -- 3.4 Primitive State and Event Definition -- 3.5 Complex Storage System Configuration -- 3.6 Complex Event System Configuration -- 3.7 Complex State and Event Definition -- 4. Bunge's Classification -- 5. Limitations of the Study -- 6. Conclusions -- References -- USING YIN'S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS -- 1. Introduction -- 2. Understanding a Case -- 2.1 What is a Case? -- 2.2 Case Study Design -- 2.3 Case Study Design -- 3. Digital Forensic Case Studies -- 3.1 Case Study 1 -- 3.2 Case Study 2 -- 3.3 Case Study 3 -- 4. Analytic Generalizations -- 5. Assessing Case Study Quality -- 6. Conclusions -- References -- AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS -- 1. Introduction -- 2. Related Work -- 3. Information Extraction Framework -- 3.1 Named Entity Recognition -- 3.2 Relation Extraction -- 4. Experiments and Analysis -- 4.1 Dataset Description -- 4.2 Data Pre-Processing -- 4.3 Experimental Results.
5. Conclusions -- References -- INTERNET CRIME INVESTIGATIONS -- A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS -- 1. Introduction -- 2. Bitcoin System Overview -- 3. Transaction Data Collection -- 4. Graph-Based Bitcoin Transaction Analysis -- 4.1 Address Clustering -- 4.2 Address Graph Observations -- 4.3 Currency Flow Analysis -- 4.4 Mt. Gox Case Study -- 5. Discussion -- 6. Conclusions -- References -- PROFILING AND TRACKING ACYBERLOCKER LINK SHARERIN A PUBLIC WEB FORUM -- 1. Introduction -- 2. Related Work -- 3. Methodology -- 3.1 Data Collection -- 3.2 User Profile Construction -- 3.3 Multidimensional Scaling Analysis -- 3.4 Cluster Analysis -- 4. Experiments -- 4.1 Datasets -- 4.2 Evaluation Metric -- 4.3 Analysis of Sharers -- 4.4 Analysis of Sharers and Followers -- 5. Conclusions -- References -- A PRIVACY-PRESERVING ENCRYPTIONSCHEME FOR AN INTERNET REALNAMEREGISTRATION SYSTEM -- 1. Introduction -- 2. Background -- 2.1 Privacy -- 2.2 Real-Name Registration in South Korea -- 2.3 Real-Name Registration in China -- 3. Real-Name Registration Requirements -- 4. Real-Name Registration Overview -- 5. Privacy-Preserving Real-Name Registration -- 5.1 User Real-Name Registration Process -- 5.2 User Web-Name Registration Process -- 5.3 Privacy-Preserving Properties -- 6. Conclusions -- References -- A LOGIC-BASED NETWORK FORENSICMODEL FOR EVIDENCE ANALYSIS -- 1. Introduction -- 2. Background and Related Work -- 2.1 MulVAL and Logical Attack Graphs -- 2.2 Evidence Graphs -- 2.3 Related Work -- 3. Network Example -- 4. Attack Scenario Reconstruction -- 4.1 Rules and Facts -- 4.2 Evidence Graph Generation -- 5. Extending MulVAL -- 5.1 Using an Anti-Forensic Database -- 5.2 Integrating Evidence Standards -- 6. Experimental Results -- 7. Conclusions -- References -- FORENSIC TECHNIQUES -- CHARACTERISTICS OF MALICIOUSDLLS IN WINDOWS MEMORY.
1. Introduction -- 2. Motivation -- 3. Related Work -- 4. Test Data Generation -- 5. Data Classification -- 6. Injected DLL Characteristics -- 7. Threats to Validity -- 8. Conclusions -- References -- DETERMINING TRIGGERINVOLVEMENT DURING FORENSICATTRIBUTION IN DATABASES -- 1. Introduction -- 2. Background -- 2.1 Forensic Attribution -- 2.2 Triggers -- 3. Trigger Identification -- 4. Algorithm Implementation -- 5. Implementation Challenges -- 5.1 Scope and Visibility -- 5.2 Encryption -- 5.3 Case Sensitivity -- 5.4 False Positive Errors -- 5.5 Data Types -- 5.6 Recursion -- 5.7 Performance -- 6. Conclusions -- References -- USING INTERNAL MySQL/InnoDBB-TREE INDEX NAVIGATION FORDATA HIDING -- 1. Introduction -- 2. Background and Related Work -- 3. InnoDB Index -- 4. Data Removal -- 4.1 Physical Deletion of Data Records -- 4.2 Forensic Impact -- 5. Data Hiding -- 5.1 Manipulating Search Results -- 5.2 Reorganizing the Index -- 5.3 Hiding Data in Index Page Garbage Space -- 5.4 Hiding Data in Index Page Free Space -- 5.5 Removing a Page from the Index -- 6. Conclusions -- References -- IDENTIFYING PASSWORDSSTORED ON DISK -- 1. Introduction -- 2. Related Work -- 3. Background -- 3.1 Probabilistic Context-Free Grammars -- 4. Examining a Disk -- 4.1 Recovering Files from a Disk -- 4.2 Retrieving Tokens from Files -- 4.3 Initial Filtering -- 4.4 Specialized Alpha String Filtering -- 5. Identifying Passwords -- 5.1 Calculating Token Probabilities -- 5.2 Ranking Algorithms -- 6. Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Initial Filtering -- 6.3 Ranking Algorithms -- 6.4 Specialized Filtering -- 7. Conclusions -- References -- FRAGMENTED JPEG FILE RECOVERYUSING PSEUDO HEADERS -- 1. Introduction -- 2. Related Work -- 3. JPEG Background -- 3.1 Essential Configurations in JPEG Headers -- 3.2 Synchronization Point.
4. JPEG File Recovery Methodology -- 4.1 Huffman Table and Sub-Sampling Factor -- 4.2 Image Resolution -- 4.3 Quantization Table -- 5. Experimental Results -- 6. Conclusions -- References -- MOBILE DEVICEFORENSICS -- FORENSIC-READY SECURE iOS APPSFOR JAILBROKEN iPHONES -- 1. Introduction -- 2. Related Work -- 3. Implementation Methodology -- 3.1 Securing Apps -- 3.2 Preserving Dates and Timestamps -- 3.3 Static Library -- 3.4 Dynamic Library -- 4. Preventing Attacks and Anti-Forensics -- 4.1 Using the Static Library -- 4.2 Using the Dynamic Library -- 5. Experimental Results -- 6. Case Study -- 7. Conclusions -- References -- A FRAMEWORK FOR DESCRIBINGMULTIMEDIA CIRCULATION INA SMARTPHONE ECOSYSTEM -- 1. Introduction -- 2. Related Work -- 3. Using Graph Databases -- 4. Use Case Experiments -- 5. Results -- 6. System Design -- 7. Conclusions -- References -- CLOUD FORENSICS -- A TRUSTWORTHY CLOUDFORENSICS ENVIRONMENT -- 1. Introduction -- 2. Related Work -- 3. Desired Properties -- 4. Challenges -- 5. FECloud Architecture -- 5.1 Logger (Themis) -- 5.2 Data Possession Manager (Metis) -- 5.3 Timestamp Manager (Chronos) -- 5.4 Provenance Manager (Clio) -- 5.5 Proof Publisher (Brizo) -- 5.6 Evidence Access Interface (Horizon) -- 5.7 Forensics-Enabled Image -- 5.8 Preliminary Results -- 6. Conclusions -- References -- LOCATING AND TRACKING DIGITALOBJECTS IN THE CLOUD -- 1. Introduction -- 2. Background -- 2.1 Cloud Computing -- 2.2 Digital Forensics -- 2.3 Data Provenance -- 3. Related Work -- 3.1 Storing Provenance Data -- 3.2 Data Provenance Requirements -- 4. Cloud-Based Provenance Model -- 5. Using a Central Logging Server -- 5.1 File Wrapper -- 5.2 Tracking Wrapper Locations -- 6. Discussion -- 7. Conclusions -- References -- FORENSIC TOOLS -- A TOOL FOR EXTRACTING STATIC ANDVOLATILE FORENSIC ARTIFACTS OFWINDOWS 8.x APPS -- 1. Introduction.
2. Related Work -- 2.1 Windows 8 Forensics -- 2.2 Forensic Analysis of Apps -- 3. Background -- 3.1 Hibernation File -- 3.2 Swap File -- 3.3 Static vs. Volatile Artifacts -- 4. Experimental Methodology -- 5. Experimental Results -- 5.1 Facebook -- 5.2 Other Apps -- 5.3 Performance -- 6. Conclusions -- References -- CRITERIA FOR VALIDATINGSECURE WIPING TOOLS -- 1. Introduction -- 2. Deletion Effects and Deletion Types -- 2.1 Deletion Effects -- 2.2 Deletion Types -- 3. File Deletion Artifacts -- 3.1 MFT Records (Recycle Bin Deletion) -- 3.2 LogFile (Recycle Bin Deletion) -- 3.3 Hard Disk (Recycle Bin Deletion) -- 3.4 MFT Records (Permanent File Deletion) -- 3.5 LogFile (Permanent File Deletion) -- 3.6 Hard Disk (Permanent File Deletion) -- 4. Validation Criteria -- 4.1 Specifications -- 4.2 Test Assertions -- 4.3 Test Cases (SW-TC) -- 4.4 Relational Summary Table -- 5. Validation Testing of Eraser -- 6. Conclusions -- References -- DO DATA LOSS PREVENTIONSYSTEMS REALLY WORK? -- 1. Introduction -- 2. Related Work -- 3. Evaluated Systems -- 3.1 Agent-Based Solution -- 3.2 Agentless Solution -- 3.3 Hybrid Solution -- 3.4 File System Scanning Tool -- 4. Experimental Setup -- 5. Experimental Results -- 6. Discussion -- 7. Conclusions -- References.
Record Nr. UNINA-9910299205603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XIV : 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XIV : 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVIII, 367 p. 98 illus.)
Disciplina 363.25968
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer networks
Computers and civilization
Computers - Law and legislation
Information technology - Law and legislation
Data structures (Computer science)
Information theory
Data and Information Security
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Data Structures and Information Theory
ISBN 3-319-99277-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910299163103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Alternate data storage forensics [[electronic resource] /] / Amber Schroader, Tyler Cohen
Alternate data storage forensics [[electronic resource] /] / Amber Schroader, Tyler Cohen
Autore Cohen Tyler
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (337 p.)
Disciplina 363.25968
Altri autori (Persone) SchroaderAmber
Soggetto topico Information storage and retrieval systems
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 1-281-07709-7
9786611077099
0-08-055475-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Alternate Data Storage Forensics; Copyright Page; Contents; Chapter 1. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Seizure of Digital Information; Introduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary
Works CitedSolutions Fast Track; Frequently Asked Questions; Chapter 3. Introduction to Handheld Forensics; Digital Forensics; What Is the Handheld Forensic Impact?; Cellular Handling; Evidence Preservation; Maintain a Forensic Data Connection; Analysis and Reporting; Chapter 4. PDA, Blackberry, and iPod Forensic Analysis; Introduction; PDA Forensics; PDA Investigative Tips; Expansion Sleeve Removed; Deploying PDA Forensic Tools; Introduction to the Blackberry; Security for Stored Data; Forensic Examination of a Blackberry; Attacking The Blackberry; Securing the Blackberry (RIM)
iPod ForensicsMisuse of an iPod; iPod Investigation; The iPod and Windows; The iPod and Linux; User Accounts; Deleted Files; iPod Time Issues; Registry Key Containing the iPod's USB/Firewire Serial Number; iPod Tools; Summary; Notes; Solutions Fast Track; Frequently Asked Questions; Chapter 5. E-mail Forensics; Introduction; Where to Start?; Forensic Acquisition; Processing Local Mail Archives; Using Paraben's Network E-mail Examiner (NEMX); Chapter 6. Router Forensics; Introduction; Network Forensics; Searching for Evidence; An Overview of Routers; Hacking Routers; Investigating Routers
Incident ResponseSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Freyuently Asked Questions; Chapter 8. CD and DVD Forensics; Physical Characteritics of CD and DVD Media; CD Features; CD and DVD Logical Structure; Space Allocation by CD and DVD File Systems; Disc Accessibility Problems; Forensic Binary Images; Collecting CD and DVD Evidence
Preparing for Disc ExaminationChapter 9. MP3 Forensics; Introduction; History; Why Is an iPod Considered Alternative Media?; Imaging and Hashing; Hardware vs . Nonhardware Imaging; Types of iPods; File Systems; "Hacking Tools" and Encrypted Home Directories; Evidence: Normal vs . Not Normal; Analysis Tools; Summary; Index
Record Nr. UNINA-9910458827103321
Cohen Tyler  
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Alternate data storage forensics [[electronic resource] /] / Amber Schroader, Tyler Cohen
Alternate data storage forensics [[electronic resource] /] / Amber Schroader, Tyler Cohen
Autore Cohen Tyler
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (337 p.)
Disciplina 363.25968
Altri autori (Persone) SchroaderAmber
Soggetto topico Information storage and retrieval systems
Computer crimes
ISBN 1-281-07709-7
9786611077099
0-08-055475-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Alternate Data Storage Forensics; Copyright Page; Contents; Chapter 1. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Seizure of Digital Information; Introduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary
Works CitedSolutions Fast Track; Frequently Asked Questions; Chapter 3. Introduction to Handheld Forensics; Digital Forensics; What Is the Handheld Forensic Impact?; Cellular Handling; Evidence Preservation; Maintain a Forensic Data Connection; Analysis and Reporting; Chapter 4. PDA, Blackberry, and iPod Forensic Analysis; Introduction; PDA Forensics; PDA Investigative Tips; Expansion Sleeve Removed; Deploying PDA Forensic Tools; Introduction to the Blackberry; Security for Stored Data; Forensic Examination of a Blackberry; Attacking The Blackberry; Securing the Blackberry (RIM)
iPod ForensicsMisuse of an iPod; iPod Investigation; The iPod and Windows; The iPod and Linux; User Accounts; Deleted Files; iPod Time Issues; Registry Key Containing the iPod's USB/Firewire Serial Number; iPod Tools; Summary; Notes; Solutions Fast Track; Frequently Asked Questions; Chapter 5. E-mail Forensics; Introduction; Where to Start?; Forensic Acquisition; Processing Local Mail Archives; Using Paraben's Network E-mail Examiner (NEMX); Chapter 6. Router Forensics; Introduction; Network Forensics; Searching for Evidence; An Overview of Routers; Hacking Routers; Investigating Routers
Incident ResponseSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Freyuently Asked Questions; Chapter 8. CD and DVD Forensics; Physical Characteritics of CD and DVD Media; CD Features; CD and DVD Logical Structure; Space Allocation by CD and DVD File Systems; Disc Accessibility Problems; Forensic Binary Images; Collecting CD and DVD Evidence
Preparing for Disc ExaminationChapter 9. MP3 Forensics; Introduction; History; Why Is an iPod Considered Alternative Media?; Imaging and Hashing; Hardware vs . Nonhardware Imaging; Types of iPods; File Systems; "Hacking Tools" and Encrypted Home Directories; Evidence: Normal vs . Not Normal; Analysis Tools; Summary; Index
Record Nr. UNINA-9910784622703321
Cohen Tyler  
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Alternate data storage forensics / / Amber Schroader, Tyler Cohen
Alternate data storage forensics / / Amber Schroader, Tyler Cohen
Autore Cohen Tyler
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (337 p.)
Disciplina 363.25968
Altri autori (Persone) SchroaderAmber
Soggetto topico Information storage and retrieval systems
Computer crimes
ISBN 1-281-07709-7
9786611077099
0-08-055475-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Alternate Data Storage Forensics; Copyright Page; Contents; Chapter 1. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Seizure of Digital Information; Introduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary
Works CitedSolutions Fast Track; Frequently Asked Questions; Chapter 3. Introduction to Handheld Forensics; Digital Forensics; What Is the Handheld Forensic Impact?; Cellular Handling; Evidence Preservation; Maintain a Forensic Data Connection; Analysis and Reporting; Chapter 4. PDA, Blackberry, and iPod Forensic Analysis; Introduction; PDA Forensics; PDA Investigative Tips; Expansion Sleeve Removed; Deploying PDA Forensic Tools; Introduction to the Blackberry; Security for Stored Data; Forensic Examination of a Blackberry; Attacking The Blackberry; Securing the Blackberry (RIM)
iPod ForensicsMisuse of an iPod; iPod Investigation; The iPod and Windows; The iPod and Linux; User Accounts; Deleted Files; iPod Time Issues; Registry Key Containing the iPod's USB/Firewire Serial Number; iPod Tools; Summary; Notes; Solutions Fast Track; Frequently Asked Questions; Chapter 5. E-mail Forensics; Introduction; Where to Start?; Forensic Acquisition; Processing Local Mail Archives; Using Paraben's Network E-mail Examiner (NEMX); Chapter 6. Router Forensics; Introduction; Network Forensics; Searching for Evidence; An Overview of Routers; Hacking Routers; Investigating Routers
Incident ResponseSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Freyuently Asked Questions; Chapter 8. CD and DVD Forensics; Physical Characteritics of CD and DVD Media; CD Features; CD and DVD Logical Structure; Space Allocation by CD and DVD File Systems; Disc Accessibility Problems; Forensic Binary Images; Collecting CD and DVD Evidence
Preparing for Disc ExaminationChapter 9. MP3 Forensics; Introduction; History; Why Is an iPod Considered Alternative Media?; Imaging and Hashing; Hardware vs . Nonhardware Imaging; Types of iPods; File Systems; "Hacking Tools" and Encrypted Home Directories; Evidence: Normal vs . Not Normal; Analysis Tools; Summary; Index
Record Nr. UNINA-9910828815903321
Cohen Tyler  
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of memory forensics [[electronic resource] ] : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh... [et al]
The art of memory forensics [[electronic resource] ] : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh... [et al]
Pubbl/distr/stampa Hoboken, : Wiley, 2014
Descrizione fisica xxiii, 886p. ; : ill
Disciplina 363.25
363.25/968
363.25968
Altri autori (Persone) LighMichael Hale
Soggetto topico Malware (Computer software) - Security measures
Computer security
Computer networks
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 9781118825044 : (ebk : EbookCentral)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910464349503321
Hoboken, : Wiley, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.]
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.]
Autore Cardwell Kevin
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress
Descrizione fisica 1 online resource (734 p.)
Disciplina 363.25968
Soggetto topico Computer crimes - Investigation
Electronic discovery (Law)
Soggetto genere / forma Electronic books.
ISBN 1-281-09638-5
9786611096380
0-08-055608-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody
Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?"
SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience
Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers!
Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works?
Conduct Objective Analysis and Reporting
Record Nr. UNINA-9910450874203321
Cardwell Kevin  
Rockland, Mass., : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.]
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.]
Autore Cardwell Kevin
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress
Descrizione fisica 1 online resource (734 p.)
Disciplina 363.25968
Soggetto topico Computer crimes - Investigation
Electronic discovery (Law)
ISBN 1-281-09638-5
9786611096380
0-08-055608-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody
Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?"
SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience
Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers!
Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works?
Conduct Objective Analysis and Reporting
Record Nr. UNINA-9910785099903321
Cardwell Kevin  
Rockland, Mass., : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui