Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate cov...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Shavers, Brett Bair, John |
description | Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online |
doi_str_mv | 10.1016/C2014-0-04561-3 |
format | Book |
fullrecord | <record><control><sourceid>proquest_skill</sourceid><recordid>TN_cdi_skillsoft_books24x7_bks000112764</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC4452264</sourcerecordid><originalsourceid>FETCH-LOGICAL-a41538-9fa4d0da60d70939f21728bb669e1571659b3a47f8defcdd1e0630543912f79a3</originalsourceid><addsrcrecordid>eNpFj0tLw0AUhUdEsdauBVfdiYvovXdemaUN1YoFN-I2TDozJiYk2olW_719QTf3cODj41zGLhFuEVDdZQQoEkhASIUJP2LngJQC55LkMRsZne67ADxlA7PBaH3P2CjGDwBArTXJdMCuZpWr2vfxxJdV68Z96cfP_q_o7NJdsJNgm-hH-xyyt4fpazZL5i-PT9n9PLECJU8TE6xw4KwCp8FwEwg1pUWhlPEoNSppCm6FDqnzYeEcelAcpOAGKWhj-ZBd78SxrpomdqHPi66rI4lfnRd13OxF0kqsyZsdaWPtV7Hsmj7mP43f4vnhbUniYP1cdl_fPvb5Flv4tl_aJp9OMiEk0dr6D6eAWzg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC4452264</pqid></control><display><type>book</type><title>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Shavers, Brett ; Bair, John</creator><creatorcontrib>Shavers, Brett ; Bair, John</creatorcontrib><description>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online</description><edition>1</edition><identifier>ISBN: 9780128033401</identifier><identifier>ISBN: 0128033401</identifier><identifier>ISBN: 0128033525</identifier><identifier>ISBN: 9780128033524</identifier><identifier>EISBN: 0128033525</identifier><identifier>EISBN: 9780128033524</identifier><identifier>DOI: 10.1016/C2014-0-04561-3</identifier><identifier>OCLC: 945612945</identifier><identifier>LCCallNum: KF8947.5 .S53 2016</identifier><language>eng</language><publisher>San Diego: Elsevier Science & Technology Books</publisher><subject>Computer crimes ; Electronic evidence ; Forensic sciences ; Internet ; Investigation ; Operating systems (Computers) ; Safety measures</subject><creationdate>2016</creationdate><tpages>256</tpages><format>256</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,780,784,786,27923</link.rule.ids></links><search><creatorcontrib>Shavers, Brett</creatorcontrib><creatorcontrib>Bair, John</creatorcontrib><title>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis</title><description>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online</description><subject>Computer crimes</subject><subject>Electronic evidence</subject><subject>Forensic sciences</subject><subject>Internet</subject><subject>Investigation</subject><subject>Operating systems (Computers)</subject><subject>Safety measures</subject><isbn>9780128033401</isbn><isbn>0128033401</isbn><isbn>0128033525</isbn><isbn>9780128033524</isbn><isbn>0128033525</isbn><isbn>9780128033524</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2016</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNpFj0tLw0AUhUdEsdauBVfdiYvovXdemaUN1YoFN-I2TDozJiYk2olW_719QTf3cODj41zGLhFuEVDdZQQoEkhASIUJP2LngJQC55LkMRsZne67ADxlA7PBaH3P2CjGDwBArTXJdMCuZpWr2vfxxJdV68Z96cfP_q_o7NJdsJNgm-hH-xyyt4fpazZL5i-PT9n9PLECJU8TE6xw4KwCp8FwEwg1pUWhlPEoNSppCm6FDqnzYeEcelAcpOAGKWhj-ZBd78SxrpomdqHPi66rI4lfnRd13OxF0kqsyZsdaWPtV7Hsmj7mP43f4vnhbUniYP1cdl_fPvb5Flv4tl_aJp9OMiEk0dr6D6eAWzg</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Shavers, Brett</creator><creator>Bair, John</creator><general>Elsevier Science & Technology Books</general><general>Syngress</general><general>Elsevier Science and Technology Books, Inc</general><scope/></search><sort><creationdate>2016</creationdate><title>Hiding Behind the Keyboard</title><author>Shavers, Brett ; Bair, John</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a41538-9fa4d0da60d70939f21728bb669e1571659b3a47f8defcdd1e0630543912f79a3</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer crimes</topic><topic>Electronic evidence</topic><topic>Forensic sciences</topic><topic>Internet</topic><topic>Investigation</topic><topic>Operating systems (Computers)</topic><topic>Safety measures</topic><toplevel>online_resources</toplevel><creatorcontrib>Shavers, Brett</creatorcontrib><creatorcontrib>Bair, John</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shavers, Brett</au><au>Bair, John</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis</btitle><date>2016</date><risdate>2016</risdate><isbn>9780128033401</isbn><isbn>0128033401</isbn><isbn>0128033525</isbn><isbn>9780128033524</isbn><eisbn>0128033525</eisbn><eisbn>9780128033524</eisbn><abstract>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online</abstract><cop>San Diego</cop><pub>Elsevier Science & Technology Books</pub><doi>10.1016/C2014-0-04561-3</doi><oclcid>945612945</oclcid><tpages>256</tpages><edition>1</edition></addata></record> |
fulltext | fulltext |
identifier | ISBN: 9780128033401 |
ispartof | |
issn | |
language | eng |
recordid | cdi_skillsoft_books24x7_bks000112764 |
source | O'Reilly Online Learning: Academic/Public Library Edition |
subjects | Computer crimes Electronic evidence Forensic sciences Internet Investigation Operating systems (Computers) Safety measures |
title | Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T14%3A07%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_skill&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Hiding%20Behind%20the%20Keyboard:%20Uncovering%20Covert%20Communication%20Methods%20with%20Forensic%20Analysis&rft.au=Shavers,%20Brett&rft.date=2016&rft.isbn=9780128033401&rft.isbn_list=0128033401&rft.isbn_list=0128033525&rft.isbn_list=9780128033524&rft_id=info:doi/10.1016/C2014-0-04561-3&rft_dat=%3Cproquest_skill%3EEBC4452264%3C/proquest_skill%3E%3Curl%3E%3C/url%3E&rft.eisbn=0128033525&rft.eisbn_list=9780128033524&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC4452264&rft_id=info:pmid/&rfr_iscdi=true |