Hiding behind the keyboard : uncovering covert communication methods with forensic analysis / (Record no. 247300)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05797cam a2200589Ii 4500 |
001 - CONTROL NUMBER | |
control field | ocn944961027 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190328114814.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160317s2016 mau ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | N$T |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | N$T |
Modifying agency | N$T |
-- | IDEBK |
-- | YDXCP |
-- | OPELS |
-- | CDX |
-- | OCLCF |
-- | EBLCP |
-- | IDB |
-- | DEBSZ |
-- | MERUC |
-- | OCLCA |
-- | OCLCQ |
-- | U3W |
-- | WRM |
-- | D6H |
-- | OCLCQ |
019 ## - | |
-- | 945034531 |
-- | 945232683 |
-- | 945612945 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128033524 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0128033525 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780128033401 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 0128033401 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)944961027 |
Canceled/invalid control number | (OCoLC)945034531 |
-- | (OCoLC)945232683 |
-- | (OCoLC)945612945 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV8080.U5 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 032000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | SOC |
Subject category code subdivision | 000000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.232 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Shavers, Brett, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Hiding behind the keyboard : uncovering covert communication methods with forensic analysis / |
Medium | [electronic resource] |
Statement of responsibility, etc. | Brett Shaves, John Bair. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cambridge, MA : |
Name of producer, publisher, distributor, manufacturer | Syngress, |
Date of production, publication, distribution, manufacture, or copyright notice | 2016. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | �2016 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (xviii, 236 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Vendor-supplied metadata. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis�i�A�exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Front Cover; Hiding Behind the Keyboard; Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis; Copyright; Contents; Foreword; INTRODUCTION; Introduction; WHAT THIS BOOK IS AND IS NOT; THE INTENDED AUDIENCE; Duration of Relevance for This Guide; SUMMARY; About the Authors; BRETT SHAVERS; JOHN BAIR; Acknowledgments; 1 -- Laying the Foundation of Covert Communications; INTRODUCTION; A BRIEF HISTORY OF COVERT COMMUNICATION; COVERT COMMUNICATION OVERLOAD; Investigative Goals; COVERT COMMUNICATION GOALS; SUMMARY; REFERENCES; 2 -- The Tor Browser; INTRODUCTION. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | HISTORY AND INTENDED USE OF THE ONION ROUTERTwo Ways of Looking at The Onion Router; HOW THE ONION ROUTER WORKS; A Few Important Points About Tor; From a Tor User's Perspective; So What's the Big Deal?; From Your Perspective; FORENSIC ANALYSIS OF THE ONION ROUTER; TRACKING CRIMINALS USING TOR; USED IN COMBINATION OF OTHER TOOLS AND METHODS; TAILS; RELATED TOR TOOLS AND APPLICATIONS; Hidden Services; SUMMARY; REFERENCES; 3 -- Triaging Mobile Evidence; LOGICAL DATA; PHYSICAL DATA; EXAMPLES OF LOGICAL AND PHYSICAL DATA; WIRELESS CARRIERS; MOBILE NETWORK OPERATORS; MOBILE VIRTUAL NETWORK OPERATOR. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | DETERMINING TARGET NUMBERFONEFINDER.NET; NUMBER PORTABILITY ADMINISTRATION CENTER; SEARCH.ORG; SUBSCRIBER IDENTITY MODULE; INTERNAL HARDWARE OF A SIM; THE SIM FILE SYSTEM; SIM SIZES AND EVOLUTION; TYPICAL EVIDENCE; SIM SECURITY-PIN AND PUK; TRIAGING DEVICES; DEVICES POWERED "ON"; DEVICES LOCATED "OFF"; MANUAL EXAMS; TOOLS AVAILABLE; Cellebrite USB Camera; Fernico ZRT; Project-A-Phone; Eclipse Kit 3; SOFTWARE SOLUTIONS; ScreenHunter; Snagit; Other Options; CHAPTER SUMMARY POINTS; REFERENCES FOR MANUAL TOOLS; 4 -- Mobile Extraction Issues; FLASH MEMORY. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | EMBEDDED MULTIMEDIA CARD, EMBEDDED MULTICHIP PACKAGE, AND MULTICHIP PACKAGETHE FUNCTION OF NAND; NAND Operation Rules; Wear Leveling and Garbage Collection; SQLite Databases; How Does All This Present Problems?; ENCODING; Binary; Binary to Decimal; Hexadecimal; American Standard Code for Information Exchange; Unicode; Big and Little Endian; Nibble Reversed; Seven-Bit Short Message Service Protocol Description Unit; EPOCHS; UNIX; Unix 48 bit; UNIX Decimal 10Byte; GPS; AOL; GSM; Decimal Format; 64bit; File Time Formatted; HTML; JAVA; MSDOS; Binary-Coded Decimal; ISO 8601; Bit Date; MAC Absolute. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | CELLEBRITE PHYSICAL ANALYZERProject Tree Example; Multimedia Message Service; USER-INSTALLED APPLICATIONS; USER-ENABLED SECURITY; BST; IP-Box and MFC Dongle; Advanced Nondestructive Exams-Joint Test Action Group; Destructive Exams; ADVANCED VALIDATION; Ultra Compare Professional; Chapter Summary; REFERENCES FOR LISTED TOOLS; 5 -- Data Hiding; INTRODUCTION; WHAT IS STEGANOGRAPHY; HIDING DATA BEHIND DATA; STEGANALYSIS; Intercepted Steganography Files; Steganalysis Applications; How Much Information Can Be Hidden; STEGANOGRAPHY METHODS; Investigative Steps; RELEVANT CASES; SUMMARY; REFERENCES. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 6 -- Cryptography and Encryption. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Undercover operations. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS |
General subdivision | Infrastructure. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | SOCIAL SCIENCE |
General subdivision | General. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00884552 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science) |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00887935 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Undercover operations. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst01160879 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Bair, John, |
Relator term | author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 9780128033401 |
-- | 0128033401 |
Record control number | (OCoLC)932174327 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | ScienceDirect |
Uniform Resource Identifier | http://www.sciencedirect.com/science/book/9780128033401 |
No items available.