Digital Forensics : threatscape and best practices / (Record no. 247264)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06062cam a2200553Mi 4500 |
001 - CONTROL NUMBER | |
control field | ocn934476226 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190328114813.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 151211s2016 mau ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | YDXCP |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | YDXCP |
Modifying agency | OCLCO |
-- | OCLCF |
-- | UMI |
-- | B24X7 |
-- | STF |
-- | IDEBK |
-- | N$T |
-- | TEFOD |
-- | CDX |
-- | EBLCP |
-- | COO |
-- | KSU |
-- | DEBBG |
-- | IDB |
-- | OPELS |
-- | LND |
-- | CDN |
-- | Z5A |
-- | LIV |
-- | OCLCQ |
-- | MERUC |
-- | OCLCQ |
-- | CNCGM |
-- | D6H |
-- | VVB |
-- | WRM |
-- | U3W |
-- | OCLCQ |
-- | CEF |
-- | EZ9 |
-- | YDX |
-- | TXM |
-- | AU@ |
019 ## - | |
-- | 932049481 |
-- | 932524451 |
-- | 933449786 |
-- | 935251107 |
-- | 944986498 |
-- | 966354953 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0128045426 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128045428 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 0128045264 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780128045268 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)934476226 |
Canceled/invalid control number | (OCoLC)932049481 |
-- | (OCoLC)932524451 |
-- | (OCoLC)933449786 |
-- | (OCoLC)935251107 |
-- | (OCoLC)944986498 |
-- | (OCoLC)966354953 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV8079.C65 |
Item number | S35 2016 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 032000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | SOC |
Subject category code subdivision | 000000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.25/968 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Sammons, John, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Digital Forensics : threatscape and best practices / |
Medium | [electronic resource] |
Statement of responsibility, etc. | edited by John Sammons. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | �2016 |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Waltham, MA : |
Name of producer, publisher, distributor, manufacturer | Syngress is an imprint of Elsevier, |
Date of production, publication, distribution, manufacture, or copyright notice | 2016. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from digital title page (viewed on January 08, 2016). |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and indexes. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. You will learn the basics of cryptocurrencies (like Bitcoin) and the artifacts they generate; discover why examination planning matters and how to do it effectively; incorporate behaviorial analysis into your digital forensics examinations; stay updated with the key artifacts created by the latest Mac OS, OS X 10.11, El Capitan. It discusses the threatscapes and challenges facing mobile device forensics, law enforcement, and legal cases; the power of applying electronic discovery workflows to digital forensics; shows the value of and impact of social media forensics. -- |
Assigning source | Edited summary from book. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover; Title Page; Copyright Page; Dedication; Contents; List of Contributors; Editor Biography; Biographies; Acknowledgments; Chapter 1 -- The cryptocurrency enigma; Purpose; Introduction; What makes a currency?; Cryptocurrency; Public key encryption basics; Forensic relevance; Bitcoin; History and current context; Bitcoin framework; Blockchain; Wallets and addresses; Transaction; Verification; Mining; Blockchain explorers; Bitcoin protocol; Forensic artifacts; Multibit HD; Blockchain transaction details; Multibit log; The bitcoin protocol in action; Inv packet; Inv packet data. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Getdata packetGetdata packet data; TX packet; TX packet data; Summary; References; Chapter 2 -- The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics; Introduction; The four phases of digital forensics; It is a matter of questions; Investigative questions; Legal questions; Forensic questions; Identification; Classification/individualization; Association; Reconstruction; Forensic questions as a bridge; Developing forensic hypotheses; Knowing how far to go; Starting the plan; How do you know when you are done? |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Examination phase -- data extractionThe forensic analysis; The examination planning process; Conclusion; Examination Planning References; Chapter 3 -- Psychological profiling as an investigative tool for digital forensics; Current model; Issues; Volume of data; Lack of context; Accountability; New model; Phases; Classification; Context analysis; Collection; Statistical analysis; Timeline analysis/visualization; Decision/opinion; Limitations; Case studies; Case study 1 -- shaken baby death; Case study 2 -- arson homicide; Case study 3 -- possession of child porn; Conclusions; References. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 4 -- The intersection between social media, crime, and digital forensics: #WhoDunIt?Introduction; Social media and crime; Social media and digital forensics; Social media evidence on the network; Social media evidence on the physical device; Summary; References; Chapter 5 -- Mobile device forensics: threats, challenges, and future trends; Introduction; The hardware versus software complexity trend; Cloud services and mobile platforms -- inherent vulnerabilities; There is an app for that -- forensic challenges and threats within apps; Social media apps; Native and non-native messaging apps. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Multimedia and VoIP "streaming" appsCloud-based storage apps; Camera-enabled apps; Location data and apps; Geotagging and EXIF data within apps; Persistent threats and challenges -- what lies ahead for mobile device forensics; Data encryption and stronger passwords; "Burner" and Chinese phones; JTAG and Chipoff analysis -- advantages, challenges, and threats; Validation and best practices of mobile forensic tools and methods -- the forensic enigma; Conclusion; References; Chapter 6 -- Digital forensics in an eDiscovery world; Introduction; eDiscovery processes and EDRM; Cat or dog not mouse. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes |
General subdivision | Investigation. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS |
General subdivision | Infrastructure. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | SOCIAL SCIENCE |
General subdivision | General. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes |
General subdivision | Investigation. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872065 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Criminology, Penology & Juvenile Delinquency. |
Source of heading or term | hilcc |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Social Welfare & Social Work. |
Source of heading or term | hilcc |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Social Sciences. |
Source of heading or term | hilcc |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Sammons, John. |
Title | Digital Forensics. |
Place, publisher, and date of publication | Waltham, MA : Syngress is an imprint of Elsevier, [2016] |
International Standard Book Number | 0128045264 |
-- | 9780128045268 |
Record control number | (OCoLC)921864840 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | ScienceDirect |
Uniform Resource Identifier | http://www.sciencedirect.com/science/book/9780128045268 |
No items available.