Alternate data storage forensics

Learn to pull digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology st...

Full description

Bibliographic Details
Main Author: Schroader, Amber
Other Authors: Cohen, Tyler
Format: eBook
Language:English
Published: Rockland, Mass. Syngress 2007
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02896nmm a2200445 u 4500
001 EB001908322
003 EBX01000000000000001071224
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1597491632 
020 |a 9780080554754 
020 |a 1281077097 
020 |a 9781597491631 
020 |a 008055475X 
050 4 |a HV8079.C65 
100 1 |a Schroader, Amber 
245 0 0 |a Alternate data storage forensics  |c Amber Schroader, Tyler Cohen 
260 |a Rockland, Mass.  |b Syngress  |c 2007 
300 |a 1 online resource 
505 0 |a Includes bibliographical references and index 
505 0 |a Chapter 1. Alternate Media; Chapter 2. Evidentiary Value; Chapter 3. Seizure and Handling; Chapter 4. Forensic Acquisition; Chapter 5. Data Analysis -- Chapter; 6. Future of ADS. 
653 |a Information storage and retrieval systems / fast 
653 |a Criminalité informatique / Enquêtes 
653 |a Information storage and retrieval systems / http://id.loc.gov/authorities/subjects/sh85066163 
653 |a Computer crimes / Investigation / fast 
653 |a Systèmes d'information 
653 |a Computer crimes / Investigation / http://id.loc.gov/authorities/subjects/sh85029493 
653 |a LAW / Forensic Science / bisacsh 
700 1 |a Cohen, Tyler 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
015 |a GBA719098 
776 |z 9780080554754 
776 |z 008055475X 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780080554754/?ar  |x Verlag  |3 Volltext 
082 0 |a 500 
082 0 |a 363.25968 
082 0 |a 364.1 
520 |a Learn to pull digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at not yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes. * Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense * Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else * Today the industry has exploded and cyber investigators can be found in almost every field