|
|
|
|
LEADER |
02896nmm a2200445 u 4500 |
001 |
EB001908322 |
003 |
EBX01000000000000001071224 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1597491632
|
020 |
|
|
|a 9780080554754
|
020 |
|
|
|a 1281077097
|
020 |
|
|
|a 9781597491631
|
020 |
|
|
|a 008055475X
|
050 |
|
4 |
|a HV8079.C65
|
100 |
1 |
|
|a Schroader, Amber
|
245 |
0 |
0 |
|a Alternate data storage forensics
|c Amber Schroader, Tyler Cohen
|
260 |
|
|
|a Rockland, Mass.
|b Syngress
|c 2007
|
300 |
|
|
|a 1 online resource
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Chapter 1. Alternate Media; Chapter 2. Evidentiary Value; Chapter 3. Seizure and Handling; Chapter 4. Forensic Acquisition; Chapter 5. Data Analysis -- Chapter; 6. Future of ADS.
|
653 |
|
|
|a Information storage and retrieval systems / fast
|
653 |
|
|
|a Criminalité informatique / Enquêtes
|
653 |
|
|
|a Information storage and retrieval systems / http://id.loc.gov/authorities/subjects/sh85066163
|
653 |
|
|
|a Computer crimes / Investigation / fast
|
653 |
|
|
|a Systèmes d'information
|
653 |
|
|
|a Computer crimes / Investigation / http://id.loc.gov/authorities/subjects/sh85029493
|
653 |
|
|
|a LAW / Forensic Science / bisacsh
|
700 |
1 |
|
|a Cohen, Tyler
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
015 |
|
|
|a GBA719098
|
776 |
|
|
|z 9780080554754
|
776 |
|
|
|z 008055475X
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780080554754/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 363.25968
|
082 |
0 |
|
|a 364.1
|
520 |
|
|
|a Learn to pull digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at not yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes. * Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense * Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else * Today the industry has exploded and cyber investigators can be found in almost every field
|