Cargando…

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis /

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis�i�A�exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Shavers, Brett (Autor), Bair, John (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress, [2016]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn944961027
003 OCoLC
005 20231120112059.0
006 m o d
007 cr cnu|||unuuu
008 160317s2016 mau ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d YDXCP  |d OPELS  |d CDX  |d OCLCF  |d EBLCP  |d IDB  |d DEBSZ  |d MERUC  |d OCLCA  |d OCLCQ  |d U3W  |d WRM  |d D6H  |d OCLCQ  |d LQU  |d DCT  |d UKMGB  |d OCLCQ  |d S2H  |d OCLCO  |d OCLCQ 
015 |a GBB649857  |2 bnb 
016 7 |a 017798430  |2 Uk 
019 |a 945034531  |a 945232683  |a 945612945  |a 1105173652  |a 1105564460 
020 |a 9780128033524  |q (electronic bk.) 
020 |a 0128033525  |q (electronic bk.) 
020 |z 9780128033401 
020 |z 0128033401 
035 |a (OCoLC)944961027  |z (OCoLC)945034531  |z (OCoLC)945232683  |z (OCoLC)945612945  |z (OCoLC)1105173652  |z (OCoLC)1105564460 
050 4 |a HV8080.U5 
072 7 |a BUS  |x 032000  |2 bisacsh 
072 7 |a SOC  |x 000000  |2 bisacsh 
082 0 4 |a 363.232  |2 23 
100 1 |a Shavers, Brett,  |e author. 
245 1 0 |a Hiding behind the keyboard :  |b uncovering covert communication methods with forensic analysis /  |c Brett Shaves, John Bair. 
264 1 |a Cambridge, MA :  |b Syngress,  |c [2016] 
264 4 |c �2016 
300 |a 1 online resource (xviii, 236 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Vendor-supplied metadata. 
520 |a Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis�i�A�exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. 
505 0 |a Front Cover; Hiding Behind the Keyboard; Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis; Copyright; Contents; Foreword; INTRODUCTION; Introduction; WHAT THIS BOOK IS AND IS NOT; THE INTENDED AUDIENCE; Duration of Relevance for This Guide; SUMMARY; About the Authors; BRETT SHAVERS; JOHN BAIR; Acknowledgments; 1 -- Laying the Foundation of Covert Communications; INTRODUCTION; A BRIEF HISTORY OF COVERT COMMUNICATION; COVERT COMMUNICATION OVERLOAD; Investigative Goals; COVERT COMMUNICATION GOALS; SUMMARY; REFERENCES; 2 -- The Tor Browser; INTRODUCTION. 
505 8 |a HISTORY AND INTENDED USE OF THE ONION ROUTERTwo Ways of Looking at The Onion Router; HOW THE ONION ROUTER WORKS; A Few Important Points About Tor; From a Tor User's Perspective; So What's the Big Deal?; From Your Perspective; FORENSIC ANALYSIS OF THE ONION ROUTER; TRACKING CRIMINALS USING TOR; USED IN COMBINATION OF OTHER TOOLS AND METHODS; TAILS; RELATED TOR TOOLS AND APPLICATIONS; Hidden Services; SUMMARY; REFERENCES; 3 -- Triaging Mobile Evidence; LOGICAL DATA; PHYSICAL DATA; EXAMPLES OF LOGICAL AND PHYSICAL DATA; WIRELESS CARRIERS; MOBILE NETWORK OPERATORS; MOBILE VIRTUAL NETWORK OPERATOR. 
505 8 |a DETERMINING TARGET NUMBERFONEFINDER.NET; NUMBER PORTABILITY ADMINISTRATION CENTER; SEARCH.ORG; SUBSCRIBER IDENTITY MODULE; INTERNAL HARDWARE OF A SIM; THE SIM FILE SYSTEM; SIM SIZES AND EVOLUTION; TYPICAL EVIDENCE; SIM SECURITY-PIN AND PUK; TRIAGING DEVICES; DEVICES POWERED "ON"; DEVICES LOCATED "OFF"; MANUAL EXAMS; TOOLS AVAILABLE; Cellebrite USB Camera; Fernico ZRT; Project-A-Phone; Eclipse Kit 3; SOFTWARE SOLUTIONS; ScreenHunter; Snagit; Other Options; CHAPTER SUMMARY POINTS; REFERENCES FOR MANUAL TOOLS; 4 -- Mobile Extraction Issues; FLASH MEMORY. 
505 8 |a EMBEDDED MULTIMEDIA CARD, EMBEDDED MULTICHIP PACKAGE, AND MULTICHIP PACKAGETHE FUNCTION OF NAND; NAND Operation Rules; Wear Leveling and Garbage Collection; SQLite Databases; How Does All This Present Problems?; ENCODING; Binary; Binary to Decimal; Hexadecimal; American Standard Code for Information Exchange; Unicode; Big and Little Endian; Nibble Reversed; Seven-Bit Short Message Service Protocol Description Unit; EPOCHS; UNIX; Unix 48 bit; UNIX Decimal 10Byte; GPS; AOL; GSM; Decimal Format; 64bit; File Time Formatted; HTML; JAVA; MSDOS; Binary-Coded Decimal; ISO 8601; Bit Date; MAC Absolute. 
505 8 |a CELLEBRITE PHYSICAL ANALYZERProject Tree Example; Multimedia Message Service; USER-INSTALLED APPLICATIONS; USER-ENABLED SECURITY; BST; IP-Box and MFC Dongle; Advanced Nondestructive Exams-Joint Test Action Group; Destructive Exams; ADVANCED VALIDATION; Ultra Compare Professional; Chapter Summary; REFERENCES FOR LISTED TOOLS; 5 -- Data Hiding; INTRODUCTION; WHAT IS STEGANOGRAPHY; HIDING DATA BEHIND DATA; STEGANALYSIS; Intercepted Steganography Files; Steganalysis Applications; How Much Information Can Be Hidden; STEGANOGRAPHY METHODS; Investigative Steps; RELEVANT CASES; SUMMARY; REFERENCES. 
505 8 |a 6 -- Cryptography and Encryption. 
650 0 |a Undercover operations. 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 6 |a Op�erations secr�etes.  |0 (CaQQLa)201-0029915 
650 6 |a Chiffrement (Informatique)  |0 (CaQQLa)201-0259253 
650 6 |a Cryptographie.  |0 (CaQQLa)201-0039807 
650 7 |a BUSINESS & ECONOMICS  |x Infrastructure.  |2 bisacsh 
650 7 |a SOCIAL SCIENCE  |x General.  |2 bisacsh 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Undercover operations.  |2 fast  |0 (OCoLC)fst01160879 
700 1 |a Bair, John,  |e author. 
776 0 8 |i Print version:  |z 9780128033401  |z 0128033401  |w (OCoLC)932174327 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128033401  |z Texto completo