Cargando…

Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects /

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in orde...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shavers, Brett
Otros Autores: Carvey, Harlan A.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, Mass. : Syngress, 2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn834597338
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130227s2013 maua ob 001 0 eng d
010 |a  2013002934 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d EBLCP  |d UIU  |d N$T  |d B24X7  |d UMI  |d COO  |d TPH  |d DEBSZ  |d GGVRL  |d YDXCP  |d OCLCF  |d OCLCQ  |d OCLCO  |d CDX  |d OCLCQ  |d OCLCO  |d OCLCA  |d IQW  |d OCLCO  |d LIV  |d MERUC  |d OCLCO  |d SAV  |d OCLCQ  |d OCLCO  |d D6H  |d CEF  |d OCLCQ  |d WYU  |d OCLCO  |d OCLCA  |d UAB  |d STF  |d UKAHL  |d VT2  |d OCLCQ  |d OCLCO  |d OCLCA  |d VLY  |d BRF  |d TUHNV  |d OCLCO  |d OCL  |d OCLCQ  |d TEFOD 
019 |a 827208774  |a 836200932  |a 846905049  |a 1065680744  |a 1103258909  |a 1129356127  |a 1134571228  |a 1162027053  |a 1192342300  |a 1235843807  |a 1240511974  |a 1243621829  |a 1262670811 
020 |a 9781597499842  |q (electronic bk.) 
020 |a 1597499846  |q (electronic bk.) 
020 |a 9786611020262 
020 |a 6611020268 
020 |a 1281020265 
020 |a 9781281020260 
020 |z 9781597499859 
020 |z 1597499854 
029 1 |a AU@  |b 000052006452 
029 1 |a DEBBG  |b BV041430702 
029 1 |a DEBSZ  |b 398265003 
029 1 |a DEBSZ  |b 431307911 
029 1 |a GBVCP  |b 785368779 
029 1 |a AU@  |b 000068473003 
035 |a (OCoLC)834597338  |z (OCoLC)827208774  |z (OCoLC)836200932  |z (OCoLC)846905049  |z (OCoLC)1065680744  |z (OCoLC)1103258909  |z (OCoLC)1129356127  |z (OCoLC)1134571228  |z (OCoLC)1162027053  |z (OCoLC)1192342300  |z (OCoLC)1235843807  |z (OCoLC)1240511974  |z (OCoLC)1243621829  |z (OCoLC)1262670811 
037 |a CL0500000221  |b Safari Books Online 
037 |a 40EFE4ED-BD3A-4EE7-B63C-274BF7030531  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HV8073  |b .S53 2013eb 
060 4 |a Online Book 
072 7 |a LAW  |x 041000  |2 bisacsh 
082 0 4 |a 363.252  |a 363.25968  |2 22 
049 |a UAMI 
100 1 |a Shavers, Brett. 
245 1 0 |a Placing the suspect behind the keyboard :  |b using digital forensics and investigative techniques to identify cybercrime suspects /  |c Brett Shavers ; Harlan Carvey, technical editor. 
260 |a Waltham, Mass. :  |b Syngress,  |c 2013. 
300 |a 1 online resource (xxii, 267 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Half Title; Title Page; Copyright; Contents; Acknowledgments; About the Author; About the Technical Editor; Foreword; Preface; 1 Introduction; Digital Evidence Collection; Simple File Copying; "Dead Box" Approaches; "Live Box" Approaches; Decision-Making FlowChart; Preview/Triage; SmartPhones and Cellular Devices; GPS; Summary; Bibliography; 2 High Tech Interview; Introduction; The Main Goal of Questioning a Suspect; The Line of Questions for Suspects; Computer skills, ability, and knowledge; Password, encryption, steganography, and deletion; Control of the device(s) in question.; Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations.; IntroductionHazards of Acting Upon Minimal Information; Physical Surveillance; Mobile surveillance; Aerial surveillance; Video surveillance; Covertly installed cameras; Other sources of surveillance records; Surveillance notes and timelines; Electronic Surveillance; Oral intercepts; Dialed number recorders; Trash runs; Tracking cell phones; Vehicle tracking; Keystroke logging; Consumer purchase records; Obtaining Personal Information; Undercover and Informant Operations; Witnesses; Neighbors as Surveillance Agents; Deconfliction; Summary; Bibliography; 4 Technical Investigations; Introduction.; Digital Investigative TechniquesWhat is a person?; Who? What? When? Why? Where? And How?; Location; Time; Wireless connections; Network (cloud) connections; Photos and videos; Geolocation warning; Internet evidence (mobile devices, computers, and game systems); Notes on device interconnectivity; Internet history; Online groups; Game consoles; HTTP extraction; IP address and relationships to devices; Texts and emails; Calendar evidence; "Other" Device Forensics; Online Social Networking; User Activity; User logins; User-specific computer activity; Digital Authorship; Profiling.; Biological Forensic EvidenceTriage and Previews; Summary; Bibliography; 5 Putting It All Together; "2 + 2 = Putting it all together"; The evidence as a whole; Avoiding assumptions; Who did it?; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography.; 7 Case Presentation. 
520 |a Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Forensic sciences  |x Data processing. 
650 0 |a Electronics in criminal investigation. 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Electronic discovery (Law) 
650 0 |a Evidence, Criminal. 
650 0 |a Crime. 
650 1 2 |a Crime 
650 6 |a Criminalistique  |x Informatique. 
650 6 |a Électronique dans les enquêtes criminelles. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Communication électronique des pièces. 
650 6 |a Preuve (Droit pénal) 
650 6 |a Criminalité. 
650 7 |a crimes (events)  |2 aat 
650 7 |a LAW  |x Forensic Science.  |2 bisacsh 
650 7 |a Crime.  |2 fast  |0 (OCoLC)fst00882984 
650 7 |a Computer crimes  |x Investigation.  |2 fast  |0 (OCoLC)fst00872065 
650 7 |a Electronic discovery (Law)  |2 fast  |0 (OCoLC)fst01737821 
650 7 |a Electronics in criminal investigation.  |2 fast  |0 (OCoLC)fst00907605 
650 7 |a Evidence, Criminal.  |2 fast  |0 (OCoLC)fst00917210 
650 7 |a Forensic sciences  |x Data processing.  |2 fast  |0 (OCoLC)fst00932012 
700 1 |a Carvey, Harlan A. 
776 0 8 |i Print version:  |a Shavers, Brett.  |t Placing the suspect behind the keyboard.  |d Waltham, Mass. : Syngress, 2013  |z 9781597499859 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597499859/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25006358 
938 |a Books 24x7  |b B247  |n bks00051027 
938 |a Coutts Information Services  |b COUT  |n 24746337 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1115188 
938 |a ebrary  |b EBRY  |n ebr10657062 
938 |a EBSCOhost  |b EBSC  |n 485201 
938 |a Cengage Learning  |b GVRL  |n GVRL6ZPF 
938 |a YBP Library Services  |b YANK  |n 2627217 
994 |a 92  |b IZTAP