Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate cov...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shavers, Brett, Bair, John
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Shavers, Brett
Bair, John
description Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online
doi_str_mv 10.1016/C2014-0-04561-3
format Book
fullrecord <record><control><sourceid>proquest_skill</sourceid><recordid>TN_cdi_skillsoft_books24x7_bks000112764</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC4452264</sourcerecordid><originalsourceid>FETCH-LOGICAL-a41538-9fa4d0da60d70939f21728bb669e1571659b3a47f8defcdd1e0630543912f79a3</originalsourceid><addsrcrecordid>eNpFj0tLw0AUhUdEsdauBVfdiYvovXdemaUN1YoFN-I2TDozJiYk2olW_719QTf3cODj41zGLhFuEVDdZQQoEkhASIUJP2LngJQC55LkMRsZne67ADxlA7PBaH3P2CjGDwBArTXJdMCuZpWr2vfxxJdV68Z96cfP_q_o7NJdsJNgm-hH-xyyt4fpazZL5i-PT9n9PLECJU8TE6xw4KwCp8FwEwg1pUWhlPEoNSppCm6FDqnzYeEcelAcpOAGKWhj-ZBd78SxrpomdqHPi66rI4lfnRd13OxF0kqsyZsdaWPtV7Hsmj7mP43f4vnhbUniYP1cdl_fPvb5Flv4tl_aJp9OMiEk0dr6D6eAWzg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC4452264</pqid></control><display><type>book</type><title>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Shavers, Brett ; Bair, John</creator><creatorcontrib>Shavers, Brett ; Bair, John</creatorcontrib><description>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online</description><edition>1</edition><identifier>ISBN: 9780128033401</identifier><identifier>ISBN: 0128033401</identifier><identifier>ISBN: 0128033525</identifier><identifier>ISBN: 9780128033524</identifier><identifier>EISBN: 0128033525</identifier><identifier>EISBN: 9780128033524</identifier><identifier>DOI: 10.1016/C2014-0-04561-3</identifier><identifier>OCLC: 945612945</identifier><identifier>LCCallNum: KF8947.5 .S53 2016</identifier><language>eng</language><publisher>San Diego: Elsevier Science &amp; Technology Books</publisher><subject>Computer crimes ; Electronic evidence ; Forensic sciences ; Internet ; Investigation ; Operating systems (Computers) ; Safety measures</subject><creationdate>2016</creationdate><tpages>256</tpages><format>256</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,780,784,786,27923</link.rule.ids></links><search><creatorcontrib>Shavers, Brett</creatorcontrib><creatorcontrib>Bair, John</creatorcontrib><title>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis</title><description>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online</description><subject>Computer crimes</subject><subject>Electronic evidence</subject><subject>Forensic sciences</subject><subject>Internet</subject><subject>Investigation</subject><subject>Operating systems (Computers)</subject><subject>Safety measures</subject><isbn>9780128033401</isbn><isbn>0128033401</isbn><isbn>0128033525</isbn><isbn>9780128033524</isbn><isbn>0128033525</isbn><isbn>9780128033524</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2016</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNpFj0tLw0AUhUdEsdauBVfdiYvovXdemaUN1YoFN-I2TDozJiYk2olW_719QTf3cODj41zGLhFuEVDdZQQoEkhASIUJP2LngJQC55LkMRsZne67ADxlA7PBaH3P2CjGDwBArTXJdMCuZpWr2vfxxJdV68Z96cfP_q_o7NJdsJNgm-hH-xyyt4fpazZL5i-PT9n9PLECJU8TE6xw4KwCp8FwEwg1pUWhlPEoNSppCm6FDqnzYeEcelAcpOAGKWhj-ZBd78SxrpomdqHPi66rI4lfnRd13OxF0kqsyZsdaWPtV7Hsmj7mP43f4vnhbUniYP1cdl_fPvb5Flv4tl_aJp9OMiEk0dr6D6eAWzg</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Shavers, Brett</creator><creator>Bair, John</creator><general>Elsevier Science &amp; Technology Books</general><general>Syngress</general><general>Elsevier Science and Technology Books, Inc</general><scope/></search><sort><creationdate>2016</creationdate><title>Hiding Behind the Keyboard</title><author>Shavers, Brett ; Bair, John</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a41538-9fa4d0da60d70939f21728bb669e1571659b3a47f8defcdd1e0630543912f79a3</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer crimes</topic><topic>Electronic evidence</topic><topic>Forensic sciences</topic><topic>Internet</topic><topic>Investigation</topic><topic>Operating systems (Computers)</topic><topic>Safety measures</topic><toplevel>online_resources</toplevel><creatorcontrib>Shavers, Brett</creatorcontrib><creatorcontrib>Bair, John</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shavers, Brett</au><au>Bair, John</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis</btitle><date>2016</date><risdate>2016</risdate><isbn>9780128033401</isbn><isbn>0128033401</isbn><isbn>0128033525</isbn><isbn>9780128033524</isbn><eisbn>0128033525</eisbn><eisbn>9780128033524</eisbn><abstract>Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online</abstract><cop>San Diego</cop><pub>Elsevier Science &amp; Technology Books</pub><doi>10.1016/C2014-0-04561-3</doi><oclcid>945612945</oclcid><tpages>256</tpages><edition>1</edition></addata></record>
fulltext fulltext
identifier ISBN: 9780128033401
ispartof
issn
language eng
recordid cdi_skillsoft_books24x7_bks000112764
source O'Reilly Online Learning: Academic/Public Library Edition
subjects Computer crimes
Electronic evidence
Forensic sciences
Internet
Investigation
Operating systems (Computers)
Safety measures
title Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T14%3A07%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_skill&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Hiding%20Behind%20the%20Keyboard:%20Uncovering%20Covert%20Communication%20Methods%20with%20Forensic%20Analysis&rft.au=Shavers,%20Brett&rft.date=2016&rft.isbn=9780128033401&rft.isbn_list=0128033401&rft.isbn_list=0128033525&rft.isbn_list=9780128033524&rft_id=info:doi/10.1016/C2014-0-04561-3&rft_dat=%3Cproquest_skill%3EEBC4452264%3C/proquest_skill%3E%3Curl%3E%3C/url%3E&rft.eisbn=0128033525&rft.eisbn_list=9780128033524&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC4452264&rft_id=info:pmid/&rfr_iscdi=true