رکورد قبلیرکورد بعدی

" Placing the suspect behind the keyboard : "


Document Type : BL
Record Number : 591752
Doc. No : b420971
Main Entry : Shavers, Brett.
Title & Author : Placing the suspect behind the keyboard : : using digital forensics and investigative techniques to identify cybercrime suspects /\ Brett Shavers ; Harlan Carvey, technical editor
Page. NO : 1 online resource (xxii, 267 pages) :: illustrations
ISBN : 9781597499842
: : 1597499846
: 9781597499859
: 1597499854
Bibliographies/Indexes : Includes bibliographical references and index
Contents : Half Title; Title Page; Copyright; Contents; Acknowledgments; About the Author; About the Technical Editor; Foreword; Preface; 1 Introduction; Digital Evidence Collection; Simple File Copying; "Dead Box" Approaches; "Live Box" Approaches; Decision-Making FlowChart; Preview/Triage; SmartPhones and Cellular Devices; GPS; Summary; Bibliography; 2 High Tech Interview; Introduction; The Main Goal of Questioning a Suspect; The Line of Questions for Suspects; Computer skills, ability, and knowledge; Password, encryption, steganography, and deletion; Control of the device(s) in question.; Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations.; IntroductionHazards of Acting Upon Minimal Information; Physical Surveillance; Mobile surveillance; Aerial surveillance; Video surveillance; Covertly installed cameras; Other sources of surveillance records; Surveillance notes and timelines; Electronic Surveillance; Oral intercepts; Dialed number recorders; Trash runs; Tracking cell phones; Vehicle tracking; Keystroke logging; Consumer purchase records; Obtaining Personal Information; Undercover and Informant Operations; Witnesses; Neighbors as Surveillance Agents; Deconfliction; Summary; Bibliography; 4 Technical Investigations; Introduction.; Digital Investigative TechniquesWhat is a person?; Who? What? When? Why? Where? And How?; Location; Time; Wireless connections; Network (cloud) connections; Photos and videos; Geolocation warning; Internet evidence (mobile devices, computers, and game systems); Notes on device interconnectivity; Internet history; Online groups; Game consoles; HTTP extraction; IP address and relationships to devices; Texts and emails; Calendar evidence; "Other" Device Forensics; Online Social Networking; User Activity; User logins; User-specific computer activity; Digital Authorship; Profiling.; Biological Forensic EvidenceTriage and Previews; Summary; Bibliography; 5 Putting It All Together; "2 + 2 = Putting it all together"; The evidence as a whole; Avoiding assumptions; Who did it?; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography.; 7 Case Presentation
Abstract : Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin
Subject : Forensic sciences-- Data processing.
Subject : Electronics in criminal investigation.
Subject : Computer crimes-- Investigation.
Subject : Electronic discovery (Law)
Subject : Evidence, Criminal.
LC Classification : ‭HV8073‬‭.S53 2013eb‬
Added Entry : Carvey, Harlan A.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟