|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn834597338 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130227s2013 maua ob 001 0 eng d |
010 |
|
|
|a 2013002934
|
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCQ
|d EBLCP
|d UIU
|d N$T
|d B24X7
|d UMI
|d COO
|d TPH
|d DEBSZ
|d GGVRL
|d YDXCP
|d OCLCF
|d OCLCQ
|d OCLCO
|d CDX
|d OCLCQ
|d OCLCO
|d OCLCA
|d IQW
|d OCLCO
|d LIV
|d MERUC
|d OCLCO
|d SAV
|d OCLCQ
|d OCLCO
|d D6H
|d CEF
|d OCLCQ
|d WYU
|d OCLCO
|d OCLCA
|d UAB
|d STF
|d UKAHL
|d VT2
|d OCLCQ
|d OCLCO
|d OCLCA
|d VLY
|d BRF
|d TUHNV
|d OCLCO
|d OCL
|d OCLCQ
|d TEFOD
|
019 |
|
|
|a 827208774
|a 836200932
|a 846905049
|a 1065680744
|a 1103258909
|a 1129356127
|a 1134571228
|a 1162027053
|a 1192342300
|a 1235843807
|a 1240511974
|a 1243621829
|a 1262670811
|
020 |
|
|
|a 9781597499842
|q (electronic bk.)
|
020 |
|
|
|a 1597499846
|q (electronic bk.)
|
020 |
|
|
|a 9786611020262
|
020 |
|
|
|a 6611020268
|
020 |
|
|
|a 1281020265
|
020 |
|
|
|a 9781281020260
|
020 |
|
|
|z 9781597499859
|
020 |
|
|
|z 1597499854
|
029 |
1 |
|
|a AU@
|b 000052006452
|
029 |
1 |
|
|a DEBBG
|b BV041430702
|
029 |
1 |
|
|a DEBSZ
|b 398265003
|
029 |
1 |
|
|a DEBSZ
|b 431307911
|
029 |
1 |
|
|a GBVCP
|b 785368779
|
029 |
1 |
|
|a AU@
|b 000068473003
|
035 |
|
|
|a (OCoLC)834597338
|z (OCoLC)827208774
|z (OCoLC)836200932
|z (OCoLC)846905049
|z (OCoLC)1065680744
|z (OCoLC)1103258909
|z (OCoLC)1129356127
|z (OCoLC)1134571228
|z (OCoLC)1162027053
|z (OCoLC)1192342300
|z (OCoLC)1235843807
|z (OCoLC)1240511974
|z (OCoLC)1243621829
|z (OCoLC)1262670811
|
037 |
|
|
|a CL0500000221
|b Safari Books Online
|
037 |
|
|
|a 40EFE4ED-BD3A-4EE7-B63C-274BF7030531
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a HV8073
|b .S53 2013eb
|
060 |
|
4 |
|a Online Book
|
072 |
|
7 |
|a LAW
|x 041000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.252
|a 363.25968
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Shavers, Brett.
|
245 |
1 |
0 |
|a Placing the suspect behind the keyboard :
|b using digital forensics and investigative techniques to identify cybercrime suspects /
|c Brett Shavers ; Harlan Carvey, technical editor.
|
260 |
|
|
|a Waltham, Mass. :
|b Syngress,
|c 2013.
|
300 |
|
|
|a 1 online resource (xxii, 267 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Half Title; Title Page; Copyright; Contents; Acknowledgments; About the Author; About the Technical Editor; Foreword; Preface; 1 Introduction; Digital Evidence Collection; Simple File Copying; "Dead Box" Approaches; "Live Box" Approaches; Decision-Making FlowChart; Preview/Triage; SmartPhones and Cellular Devices; GPS; Summary; Bibliography; 2 High Tech Interview; Introduction; The Main Goal of Questioning a Suspect; The Line of Questions for Suspects; Computer skills, ability, and knowledge; Password, encryption, steganography, and deletion; Control of the device(s) in question.; Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations.; IntroductionHazards of Acting Upon Minimal Information; Physical Surveillance; Mobile surveillance; Aerial surveillance; Video surveillance; Covertly installed cameras; Other sources of surveillance records; Surveillance notes and timelines; Electronic Surveillance; Oral intercepts; Dialed number recorders; Trash runs; Tracking cell phones; Vehicle tracking; Keystroke logging; Consumer purchase records; Obtaining Personal Information; Undercover and Informant Operations; Witnesses; Neighbors as Surveillance Agents; Deconfliction; Summary; Bibliography; 4 Technical Investigations; Introduction.; Digital Investigative TechniquesWhat is a person?; Who? What? When? Why? Where? And How?; Location; Time; Wireless connections; Network (cloud) connections; Photos and videos; Geolocation warning; Internet evidence (mobile devices, computers, and game systems); Notes on device interconnectivity; Internet history; Online groups; Game consoles; HTTP extraction; IP address and relationships to devices; Texts and emails; Calendar evidence; "Other" Device Forensics; Online Social Networking; User Activity; User logins; User-specific computer activity; Digital Authorship; Profiling.; Biological Forensic EvidenceTriage and Previews; Summary; Bibliography; 5 Putting It All Together; "2 + 2 = Putting it all together"; The evidence as a whole; Avoiding assumptions; Who did it?; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography.; 7 Case Presentation.
|
520 |
|
|
|a Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Forensic sciences
|x Data processing.
|
650 |
|
0 |
|a Electronics in criminal investigation.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Electronic discovery (Law)
|
650 |
|
0 |
|a Evidence, Criminal.
|
650 |
|
0 |
|a Crime.
|
650 |
1 |
2 |
|a Crime
|
650 |
|
6 |
|a Criminalistique
|x Informatique.
|
650 |
|
6 |
|a Électronique dans les enquêtes criminelles.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Communication électronique des pièces.
|
650 |
|
6 |
|a Preuve (Droit pénal)
|
650 |
|
6 |
|a Criminalité.
|
650 |
|
7 |
|a crimes (events)
|2 aat
|
650 |
|
7 |
|a LAW
|x Forensic Science.
|2 bisacsh
|
650 |
|
7 |
|a Crime.
|2 fast
|0 (OCoLC)fst00882984
|
650 |
|
7 |
|a Computer crimes
|x Investigation.
|2 fast
|0 (OCoLC)fst00872065
|
650 |
|
7 |
|a Electronic discovery (Law)
|2 fast
|0 (OCoLC)fst01737821
|
650 |
|
7 |
|a Electronics in criminal investigation.
|2 fast
|0 (OCoLC)fst00907605
|
650 |
|
7 |
|a Evidence, Criminal.
|2 fast
|0 (OCoLC)fst00917210
|
650 |
|
7 |
|a Forensic sciences
|x Data processing.
|2 fast
|0 (OCoLC)fst00932012
|
700 |
1 |
|
|a Carvey, Harlan A.
|
776 |
0 |
8 |
|i Print version:
|a Shavers, Brett.
|t Placing the suspect behind the keyboard.
|d Waltham, Mass. : Syngress, 2013
|z 9781597499859
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597499859/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25006358
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00051027
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 24746337
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1115188
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10657062
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 485201
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL6ZPF
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2627217
|
994 |
|
|
|a 92
|b IZTAP
|