Cargando…

Digital Forensics : threatscape and best practices /

This book surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. You will learn the basics of cryptocurrencies (like Bitcoin) and the artifacts they generate; discover why examination planning matters and how to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sammons, John (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress is an imprint of Elsevier, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn934476226
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 151211s2016 mau ob 001 0 eng d
040 |a YDXCP  |b eng  |e rda  |e pn  |c YDXCP  |d OCLCO  |d OCLCF  |d UMI  |d B24X7  |d STF  |d IDEBK  |d N$T  |d TEFOD  |d CDX  |d EBLCP  |d COO  |d KSU  |d DEBBG  |d IDB  |d OPELS  |d LND  |d CDN  |d Z5A  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d CNCGM  |d D6H  |d VVB  |d WRM  |d U3W  |d OCLCQ  |d CEF  |d EZ9  |d YDX  |d TXM  |d AU@  |d DCT  |d OCLCQ  |d VLY  |d OCLCQ  |d MM9  |d OCLCQ  |d OCLCO  |d NZAUC  |d OCLCQ  |d OCLCO 
019 |a 932049481  |a 932524451  |a 933449786  |a 935251107  |a 944986498  |a 966354953  |a 1162405963 
020 |a 0128045426  |q (electronic bk.) 
020 |a 9780128045428  |q (electronic bk.) 
020 |z 0128045264 
020 |z 9780128045268 
029 1 |a AU@  |b 000057032246 
029 1 |a AU@  |b 000057101214 
029 1 |a CHNEW  |b 000894023 
029 1 |a CHNEW  |b 001001313 
029 1 |a CHNEW  |b 001026563 
029 1 |a DEBBG  |b BV043627762 
029 1 |a DEBBG  |b BV043969008 
029 1 |a DEBSZ  |b 485795213 
029 1 |a GBVCP  |b 856733350 
029 1 |a GBVCP  |b 882753606 
035 |a (OCoLC)934476226  |z (OCoLC)932049481  |z (OCoLC)932524451  |z (OCoLC)933449786  |z (OCoLC)935251107  |z (OCoLC)944986498  |z (OCoLC)966354953  |z (OCoLC)1162405963 
037 |a 878827  |b MIL 
050 4 |a HV8079.C65  |b S35 2016 
072 7 |a BUS  |x 032000  |2 bisacsh 
072 7 |a SOC  |x 000000  |2 bisacsh 
082 0 4 |a 363.25/968  |2 23 
049 |a UAMI 
100 1 |a Sammons, John,  |e author. 
245 1 0 |a Digital Forensics :  |b threatscape and best practices /  |c edited by John Sammons. 
264 1 |a Waltham, MA :  |b Syngress is an imprint of Elsevier,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from digital title page (viewed on January 08, 2016). 
504 |a Includes bibliographical references and indexes. 
520 |a This book surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. You will learn the basics of cryptocurrencies (like Bitcoin) and the artifacts they generate; discover why examination planning matters and how to do it effectively; incorporate behaviorial analysis into your digital forensics examinations; stay updated with the key artifacts created by the latest Mac OS, OS X 10.11, El Capitan. It discusses the threatscapes and challenges facing mobile device forensics, law enforcement, and legal cases; the power of applying electronic discovery workflows to digital forensics; shows the value of and impact of social media forensics. --  |c Edited summary from book. 
505 0 |a Cover; Title Page; Copyright Page; Dedication; Contents; List of Contributors; Editor Biography; Biographies; Acknowledgments; Chapter 1 -- The cryptocurrency enigma; Purpose; Introduction; What makes a currency?; Cryptocurrency; Public key encryption basics; Forensic relevance; Bitcoin; History and current context; Bitcoin framework; Blockchain; Wallets and addresses; Transaction; Verification; Mining; Blockchain explorers; Bitcoin protocol; Forensic artifacts; Multibit HD; Blockchain transaction details; Multibit log; The bitcoin protocol in action; Inv packet; Inv packet data. 
505 8 |a Getdata packetGetdata packet data; TX packet; TX packet data; Summary; References; Chapter 2 -- The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics; Introduction; The four phases of digital forensics; It is a matter of questions; Investigative questions; Legal questions; Forensic questions; Identification; Classification/individualization; Association; Reconstruction; Forensic questions as a bridge; Developing forensic hypotheses; Knowing how far to go; Starting the plan; How do you know when you are done? 
505 8 |a Examination phase -- data extractionThe forensic analysis; The examination planning process; Conclusion; Examination Planning References; Chapter 3 -- Psychological profiling as an investigative tool for digital forensics; Current model; Issues; Volume of data; Lack of context; Accountability; New model; Phases; Classification; Context analysis; Collection; Statistical analysis; Timeline analysis/visualization; Decision/opinion; Limitations; Case studies; Case study 1 -- shaken baby death; Case study 2 -- arson homicide; Case study 3 -- possession of child porn; Conclusions; References. 
505 8 |a Chapter 4 -- The intersection between social media, crime, and digital forensics: #WhoDunIt?Introduction; Social media and crime; Social media and digital forensics; Social media evidence on the network; Social media evidence on the physical device; Summary; References; Chapter 5 -- Mobile device forensics: threats, challenges, and future trends; Introduction; The hardware versus software complexity trend; Cloud services and mobile platforms -- inherent vulnerabilities; There is an app for that -- forensic challenges and threats within apps; Social media apps; Native and non-native messaging apps. 
505 8 |a Multimedia and VoIP "streaming" appsCloud-based storage apps; Camera-enabled apps; Location data and apps; Geotagging and EXIF data within apps; Persistent threats and challenges -- what lies ahead for mobile device forensics; Data encryption and stronger passwords; "Burner" and Chinese phones; JTAG and Chipoff analysis -- advantages, challenges, and threats; Validation and best practices of mobile forensic tools and methods -- the forensic enigma; Conclusion; References; Chapter 6 -- Digital forensics in an eDiscovery world; Introduction; eDiscovery processes and EDRM; Cat or dog not mouse. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer crimes  |x Investigation. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a BUSINESS & ECONOMICS  |x Infrastructure.  |2 bisacsh 
650 7 |a SOCIAL SCIENCE  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Investigation  |2 fast 
776 0 8 |i Print version:  |a Sammons, John.  |t Digital Forensics.  |d Waltham, MA : Syngress is an imprint of Elsevier, [2016]  |z 0128045264  |z 9780128045268  |w (OCoLC)921864840 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128045428/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
938 |a Books 24x7  |b B247  |n bks00106789 
938 |a Coutts Information Services  |b COUT  |n 33360989 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4202861 
938 |a EBSCOhost  |b EBSC  |n 1107657 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis33360989 
938 |a YBP Library Services  |b YANK  |n 12762240 
994 |a 92  |b IZTAP