Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 22 of 105
Previous Record Next Record
E-Book/E-Doc
Author Sammons, John, author.

Title Digital Forensics : threatscape and best practices / edited by John Sammons.

Publication Info. Waltham, MA : Syngress is an imprint of Elsevier, [2016]
©2016

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note Online resource; title from digital title page (viewed on January 08, 2016).
Bibliography Includes bibliographical references and indexes.
Summary This book surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. You will learn the basics of cryptocurrencies (like Bitcoin) and the artifacts they generate; discover why examination planning matters and how to do it effectively; incorporate behaviorial analysis into your digital forensics examinations; stay updated with the key artifacts created by the latest Mac OS, OS X 10.11, El Capitan. It discusses the threatscapes and challenges facing mobile device forensics, law enforcement, and legal cases; the power of applying electronic discovery workflows to digital forensics; shows the value of and impact of social media forensics. -- Edited summary from book.
Contents Cover; Title Page; Copyright Page; Dedication; Contents; List of Contributors; Editor Biography; Biographies; Acknowledgments; Chapter 1 -- The cryptocurrency enigma; Purpose; Introduction; What makes a currency?; Cryptocurrency; Public key encryption basics; Forensic relevance; Bitcoin; History and current context; Bitcoin framework; Blockchain; Wallets and addresses; Transaction; Verification; Mining; Blockchain explorers; Bitcoin protocol; Forensic artifacts; Multibit HD; Blockchain transaction details; Multibit log; The bitcoin protocol in action; Inv packet; Inv packet data.
Getdata packetGetdata packet data; TX packet; TX packet data; Summary; References; Chapter 2 -- The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics; Introduction; The four phases of digital forensics; It is a matter of questions; Investigative questions; Legal questions; Forensic questions; Identification; Classification/individualization; Association; Reconstruction; Forensic questions as a bridge; Developing forensic hypotheses; Knowing how far to go; Starting the plan; How do you know when you are done?
Examination phase -- data extractionThe forensic analysis; The examination planning process; Conclusion; Examination Planning References; Chapter 3 -- Psychological profiling as an investigative tool for digital forensics; Current model; Issues; Volume of data; Lack of context; Accountability; New model; Phases; Classification; Context analysis; Collection; Statistical analysis; Timeline analysis/visualization; Decision/opinion; Limitations; Case studies; Case study 1 -- shaken baby death; Case study 2 -- arson homicide; Case study 3 -- possession of child porn; Conclusions; References.
Chapter 4 -- The intersection between social media, crime, and digital forensics: #WhoDunIt?Introduction; Social media and crime; Social media and digital forensics; Social media evidence on the network; Social media evidence on the physical device; Summary; References; Chapter 5 -- Mobile device forensics: threats, challenges, and future trends; Introduction; The hardware versus software complexity trend; Cloud services and mobile platforms -- inherent vulnerabilities; There is an app for that -- forensic challenges and threats within apps; Social media apps; Native and non-native messaging apps.
Multimedia and VoIP "streaming" appsCloud-based storage apps; Camera-enabled apps; Location data and apps; Geotagging and EXIF data within apps; Persistent threats and challenges -- what lies ahead for mobile device forensics; Data encryption and stronger passwords; "Burner" and Chinese phones; JTAG and Chipoff analysis -- advantages, challenges, and threats; Validation and best practices of mobile forensic tools and methods -- the forensic enigma; Conclusion; References; Chapter 6 -- Digital forensics in an eDiscovery world; Introduction; eDiscovery processes and EDRM; Cat or dog not mouse.
Language English.
Subject Computer crimes -- Investigation.
Criminalité informatique -- Enquêtes.
BUSINESS & ECONOMICS -- Infrastructure.
SOCIAL SCIENCE -- General.
Computer crimes -- Investigation
Other Form: Print version: Sammons, John. Digital Forensics. Waltham, MA : Syngress is an imprint of Elsevier, [2016] 0128045264 9780128045268 (OCoLC)921864840
ISBN 0128045426 (electronic bk.)
9780128045428 (electronic bk.)
0128045264
9780128045268
Standard No. AU@ 000057032246
AU@ 000057101214
CHNEW 000894023
CHNEW 001001313
CHNEW 001026563
DEBBG BV043627762
DEBBG BV043969008
DEBSZ 485795213
GBVCP 856733350
GBVCP 882753606

 
    
Available items only