Alternate data storage forensics

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Schroader, Amber (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Rockland, Mass. Syngress 2007
Schlagworte:
Online-Zugang:DE-1046
DE-1047
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV043043947
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151123s2007 xx o|||| 00||| eng d
020 |a 008055475X  |c electronic bk.  |9 0-08-055475-X 
020 |a 1281077097  |9 1-281-07709-7 
020 |a 1597491632  |9 1-59749-163-2 
020 |a 9780080554754  |c electronic bk.  |9 978-0-08-055475-4 
020 |a 9781281077097  |9 978-1-281-07709-7 
020 |a 9781597491631  |9 978-1-59749-163-1 
035 |a (OCoLC)162131594 
035 |a (DE-599)BVBBV043043947 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 363.25968  |2 22 
100 1 |a Schroader, Amber  |e Verfasser  |4 aut 
245 1 0 |a Alternate data storage forensics  |c Amber Schroader, Tyler Cohen 
264 1 |a Rockland, Mass.  |b Syngress  |c 2007 
300 |a 1 Online-Ressource 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Learn to pull digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at not yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes. * Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense * Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else * Today the industry has exploded and cyber investigators can be found in almost every field 
500 |a Chapter 1. Alternate Media; Chapter 2. Evidentiary Value; Chapter 3. Seizure and Handling; Chapter 4. Forensic Acquisition; Chapter 5. Data Analysis -- Chapter; 6. Future of ADS. 
500 |a Includes bibliographical references and index 
650 4 |a Criminal investigation 
650 4 |a Information retrieval 
650 4 |a Computer crimes 
650 7 |a LAW / Forensic Science  |2 bisacsh 
650 7 |a Computer crimes / Investigation  |2 fast 
650 7 |a Information storage and retrieval systems  |2 fast 
650 4 |a Computer crimes  |x Investigation 
650 4 |a Information storage and retrieval systems 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Computervirus  |0 (DE-588)4214774-8  |2 gnd  |9 rswk-swf 
689 0 0 |a Computervirus  |0 (DE-588)4214774-8  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
700 1 |a Cohen, Tyler  |e Sonstige  |4 oth 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=212323  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028468485 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=212323  |l DE-1046  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=212323  |l DE-1047  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819295303231078400
any_adam_object
author Schroader, Amber
author_facet Schroader, Amber
author_role aut
author_sort Schroader, Amber
author_variant a s as
building Verbundindex
bvnumber BV043043947
collection ZDB-4-EBA
ctrlnum (OCoLC)162131594
(DE-599)BVBBV043043947
dewey-full 363.25968
dewey-hundreds 300 - Social sciences
dewey-ones 363 - Other social problems and services
dewey-raw 363.25968
dewey-search 363.25968
dewey-sort 3363.25968
dewey-tens 360 - Social problems and services; associations
discipline Soziologie
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03705nam a2200577zc 4500</leader><controlfield tag="001">BV043043947</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2007 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008055475X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055475-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281077097</subfield><subfield code="9">1-281-07709-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491632</subfield><subfield code="9">1-59749-163-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080554754</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055475-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281077097</subfield><subfield code="9">978-1-281-07709-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491631</subfield><subfield code="9">978-1-59749-163-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162131594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043043947</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25968</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schroader, Amber</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Alternate data storage forensics</subfield><subfield code="c">Amber Schroader, Tyler Cohen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Learn to pull digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at not yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes. * Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense * Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else * Today the industry has exploded and cyber investigators can be found in almost every field</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1. Alternate Media; Chapter 2. Evidentiary Value; Chapter 3. Seizure and Handling; Chapter 4. Forensic Acquisition; Chapter 5. Data Analysis -- Chapter; 6. Future of ADS.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminal investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Forensic Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information storage and retrieval systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cohen, Tyler</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=212323</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028468485</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=212323</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=212323</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043043947
illustrated Not Illustrated
indexdate 2024-12-24T04:40:02Z
institution BVB
isbn 008055475X
1281077097
1597491632
9780080554754
9781281077097
9781597491631
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028468485
oclc_num 162131594
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2007
publishDateSearch 2007
publishDateSort 2007
publisher Syngress
record_format marc
spelling Schroader, Amber Verfasser aut
Alternate data storage forensics Amber Schroader, Tyler Cohen
Rockland, Mass. Syngress 2007
1 Online-Ressource
txt rdacontent
c rdamedia
cr rdacarrier
Learn to pull digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at not yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes. * Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense * Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else * Today the industry has exploded and cyber investigators can be found in almost every field
Chapter 1. Alternate Media; Chapter 2. Evidentiary Value; Chapter 3. Seizure and Handling; Chapter 4. Forensic Acquisition; Chapter 5. Data Analysis -- Chapter; 6. Future of ADS.
Includes bibliographical references and index
Criminal investigation
Information retrieval
Computer crimes
LAW / Forensic Science bisacsh
Computer crimes / Investigation fast
Information storage and retrieval systems fast
Computer crimes Investigation
Information storage and retrieval systems
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Computervirus (DE-588)4214774-8 gnd rswk-swf
Computervirus (DE-588)4214774-8 s
Computersicherheit (DE-588)4274324-2 s
DE-604
Cohen, Tyler Sonstige oth
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=212323 Aggregator Volltext
spellingShingle Schroader, Amber
Alternate data storage forensics
Criminal investigation
Information retrieval
Computer crimes
LAW / Forensic Science bisacsh
Computer crimes / Investigation fast
Information storage and retrieval systems fast
Computer crimes Investigation
Information storage and retrieval systems
Computersicherheit (DE-588)4274324-2 gnd
Computervirus (DE-588)4214774-8 gnd
subject_GND (DE-588)4274324-2
(DE-588)4214774-8
title Alternate data storage forensics
title_auth Alternate data storage forensics
title_exact_search Alternate data storage forensics
title_full Alternate data storage forensics Amber Schroader, Tyler Cohen
title_fullStr Alternate data storage forensics Amber Schroader, Tyler Cohen
title_full_unstemmed Alternate data storage forensics Amber Schroader, Tyler Cohen
title_short Alternate data storage forensics
title_sort alternate data storage forensics
topic Criminal investigation
Information retrieval
Computer crimes
LAW / Forensic Science bisacsh
Computer crimes / Investigation fast
Information storage and retrieval systems fast
Computer crimes Investigation
Information storage and retrieval systems
Computersicherheit (DE-588)4274324-2 gnd
Computervirus (DE-588)4214774-8 gnd
topic_facet Criminal investigation
Information retrieval
Computer crimes
LAW / Forensic Science
Computer crimes / Investigation
Information storage and retrieval systems
Computer crimes Investigation
Computersicherheit
Computervirus
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=212323
work_keys_str_mv AT schroaderamber alternatedatastorageforensics
AT cohentyler alternatedatastorageforensics