000 05797cam a2200589Ii 4500
001 ocn944961027
003 OCoLC
005 20190328114814.0
006 m o d
007 cr cnu|||unuuu
008 160317s2016 mau ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dIDEBK
_dYDXCP
_dOPELS
_dCDX
_dOCLCF
_dEBLCP
_dIDB
_dDEBSZ
_dMERUC
_dOCLCA
_dOCLCQ
_dU3W
_dWRM
_dD6H
_dOCLCQ
019 _a945034531
_a945232683
_a945612945
020 _a9780128033524
_q(electronic bk.)
020 _a0128033525
_q(electronic bk.)
020 _z9780128033401
020 _z0128033401
035 _a(OCoLC)944961027
_z(OCoLC)945034531
_z(OCoLC)945232683
_z(OCoLC)945612945
050 4 _aHV8080.U5
072 7 _aBUS
_x032000
_2bisacsh
072 7 _aSOC
_x000000
_2bisacsh
082 0 4 _a363.232
_223
100 1 _aShavers, Brett,
_eauthor.
245 1 0 _aHiding behind the keyboard : uncovering covert communication methods with forensic analysis /
_h[electronic resource]
_cBrett Shaves, John Bair.
264 1 _aCambridge, MA :
_bSyngress,
_c2016.
264 4 _c�2016
300 _a1 online resource (xviii, 236 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
588 0 _aVendor-supplied metadata.
520 _aHiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis�i�A�exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
505 0 _aFront Cover; Hiding Behind the Keyboard; Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis; Copyright; Contents; Foreword; INTRODUCTION; Introduction; WHAT THIS BOOK IS AND IS NOT; THE INTENDED AUDIENCE; Duration of Relevance for This Guide; SUMMARY; About the Authors; BRETT SHAVERS; JOHN BAIR; Acknowledgments; 1 -- Laying the Foundation of Covert Communications; INTRODUCTION; A BRIEF HISTORY OF COVERT COMMUNICATION; COVERT COMMUNICATION OVERLOAD; Investigative Goals; COVERT COMMUNICATION GOALS; SUMMARY; REFERENCES; 2 -- The Tor Browser; INTRODUCTION.
505 8 _aHISTORY AND INTENDED USE OF THE ONION ROUTERTwo Ways of Looking at The Onion Router; HOW THE ONION ROUTER WORKS; A Few Important Points About Tor; From a Tor User's Perspective; So What's the Big Deal?; From Your Perspective; FORENSIC ANALYSIS OF THE ONION ROUTER; TRACKING CRIMINALS USING TOR; USED IN COMBINATION OF OTHER TOOLS AND METHODS; TAILS; RELATED TOR TOOLS AND APPLICATIONS; Hidden Services; SUMMARY; REFERENCES; 3 -- Triaging Mobile Evidence; LOGICAL DATA; PHYSICAL DATA; EXAMPLES OF LOGICAL AND PHYSICAL DATA; WIRELESS CARRIERS; MOBILE NETWORK OPERATORS; MOBILE VIRTUAL NETWORK OPERATOR.
505 8 _aDETERMINING TARGET NUMBERFONEFINDER.NET; NUMBER PORTABILITY ADMINISTRATION CENTER; SEARCH.ORG; SUBSCRIBER IDENTITY MODULE; INTERNAL HARDWARE OF A SIM; THE SIM FILE SYSTEM; SIM SIZES AND EVOLUTION; TYPICAL EVIDENCE; SIM SECURITY-PIN AND PUK; TRIAGING DEVICES; DEVICES POWERED "ON"; DEVICES LOCATED "OFF"; MANUAL EXAMS; TOOLS AVAILABLE; Cellebrite USB Camera; Fernico ZRT; Project-A-Phone; Eclipse Kit 3; SOFTWARE SOLUTIONS; ScreenHunter; Snagit; Other Options; CHAPTER SUMMARY POINTS; REFERENCES FOR MANUAL TOOLS; 4 -- Mobile Extraction Issues; FLASH MEMORY.
505 8 _aEMBEDDED MULTIMEDIA CARD, EMBEDDED MULTICHIP PACKAGE, AND MULTICHIP PACKAGETHE FUNCTION OF NAND; NAND Operation Rules; Wear Leveling and Garbage Collection; SQLite Databases; How Does All This Present Problems?; ENCODING; Binary; Binary to Decimal; Hexadecimal; American Standard Code for Information Exchange; Unicode; Big and Little Endian; Nibble Reversed; Seven-Bit Short Message Service Protocol Description Unit; EPOCHS; UNIX; Unix 48 bit; UNIX Decimal 10Byte; GPS; AOL; GSM; Decimal Format; 64bit; File Time Formatted; HTML; JAVA; MSDOS; Binary-Coded Decimal; ISO 8601; Bit Date; MAC Absolute.
505 8 _aCELLEBRITE PHYSICAL ANALYZERProject Tree Example; Multimedia Message Service; USER-INSTALLED APPLICATIONS; USER-ENABLED SECURITY; BST; IP-Box and MFC Dongle; Advanced Nondestructive Exams-Joint Test Action Group; Destructive Exams; ADVANCED VALIDATION; Ultra Compare Professional; Chapter Summary; REFERENCES FOR LISTED TOOLS; 5 -- Data Hiding; INTRODUCTION; WHAT IS STEGANOGRAPHY; HIDING DATA BEHIND DATA; STEGANALYSIS; Intercepted Steganography Files; Steganalysis Applications; How Much Information Can Be Hidden; STEGANOGRAPHY METHODS; Investigative Steps; RELEVANT CASES; SUMMARY; REFERENCES.
505 8 _a6 -- Cryptography and Encryption.
650 0 _aUndercover operations.
650 0 _aData encryption (Computer science)
650 0 _aCryptography.
650 7 _aBUSINESS & ECONOMICS
_xInfrastructure.
_2bisacsh
650 7 _aSOCIAL SCIENCE
_xGeneral.
_2bisacsh
650 7 _aCryptography.
_2fast
_0(OCoLC)fst00884552
650 7 _aData encryption (Computer science)
_2fast
_0(OCoLC)fst00887935
650 7 _aUndercover operations.
_2fast
_0(OCoLC)fst01160879
655 4 _aElectronic books.
700 1 _aBair, John,
_eauthor.
776 0 8 _iPrint version:
_z9780128033401
_z0128033401
_w(OCoLC)932174327
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128033401
999 _c247300
_d247300