%{search_type} search results

38 catalog results

RSS feed for this result
Book
xiv, 72 p. ; 30 cm.
  • Origin of investigation and background
  • Assessing electronic evidence
  • Computer-related matters and the South African Law Reform Commssion
  • Electronic evidence in civil proceedings
  • Electronic evidence in criminal proceedings
  • The Electronic Communication and Transactions Act 25 of 2002
  • Conclusion and summary of questions for comment.
Law Library (Crown)
Book
xiv, 368 pages : illustrations ; 23 cm
  • Entering the world of cybercrime
  • An introduction to computer forensics investigations and electronic evidence
  • Laws regulating access to electronic evidence
  • Searches and seizures of computers and electronic evidence
  • Cybercrime laws : which statute for which crime?
  • Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators!
  • Where is the electronic evidence and which tools can we use to find it?
  • Crime and incident scene : what should an investigator do?
  • Corporate crimes and policy violations involving computers : how to conduct a corporate investigation
  • E-mail forensics
  • Network forensics : an introduction
  • Mobile phones and PDAs in computer forensics investigations
  • The pretrial and courtroom experiences of a computer forensics investigator.
Balancing technicality and legal analysis, Computer Forensics: Cybercriminals, Laws and Evidence enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy and administration.
(source: Nielsen Book Data)9781449600723 20160605
Law Library (Crown)
Book
x, 247 pages ; 23 cm.
  • Electronically stored information : what matrimonial lawyers and computer forensics need to know / by Gaetano Ferro, Marcus Lawson and Sarah Murray
  • Admissibility of electronic stored information : it's still the same old story / by Sheldon M. Finkelstein and Evelyn R. Storch
  • In-depth examination of the law regarding spoliation in state and federal courts / by Carole S. Gailor
  • Privacy and litigation : two mutually exclusive concepts / by Margaret D. McGarity
  • The individual's right of privacy in a marriage / by Laura W. Morgan and Lewis B. Reich
  • Down the rabbit's hole : baby monitors, family movies and wiretap law / by Elisabeth Pride.
Law Library (Crown)
Book
xi, 109 pages : illustrations, forms ; 23 cm
  • Introduction to social media
  • Retrieval and retention of social media data
  • Discovery of social media data in a civil action
  • Foundation and authentication
  • Use of social media during trial.
Law Library (Crown)
Book
xv, 156 p. ; 21 cm.
Green Library
Book
31 pages : illustrations ; 28 cm
SAL3 (off-campus storage)
Book
1 online resource (1 volume) : illustrations
Book
1 online resource (xxvii, 807 p.) : ill., maps.
  • Foundations of digital forensics
  • Language of computer crime investigation
  • Digital evidence in the courtroom
  • Cybercrime law : a United States perspective
  • Cybercrime law : a European perspective
  • Conducting digital investigations
  • Handling a digital crime scene
  • Investigative reconstruction with digital evidence
  • Modus operandi, motive, and technology
  • Violent crime and digital evidence
  • Digital evidence as alibi
  • Sex offenders on the Internet
  • Computer intrusions
  • Cyberstalking
  • Computer basics for digital investigators
  • Applying forensic science to computers
  • DIgital evidence on Windows systems
  • Digital evidence on UNIX systems
  • Digital evidence on Macintosh systems
  • Digital evidence on mobile devices
  • Network basics for digital investigators
  • Applying forensic science to networks
  • DIgital evidence on the Internet
  • DIgital evidence on physical and data-link layers
  • Digital evidence at the network and transport layers.
"Digital Evidence and Computer Crime, Third Edition" provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills. The textbook teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. Additionally, this third edition includes updated chapters dedicated to networked Windows, Unix, and Macintosh computers, and Personal Digital Assistants. Ancillary materials include an Instructor's Manual and PowerPoint slides. Named The 2011 Best Digital Forensics Book by "InfoSec Reviews"Provides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks.
(source: Nielsen Book Data)9780080921488 20160608
Book
1 online resource.
  • Front Cover; DIGITAL FORENSICS TRIAL GRAPHICS; DIGITAL FORENSICS TRIAL GRAPHICS: Teaching the Jury through Effective Use of Visuals; Copyright; Dedication; CONTENTS; ABOUT THE AUTHORS; FOREWORD; ONE
  • INTRODUCTION; CHAPTER 2: BUT I AM NOT AN ARTIST; CHAPTER 3: PRINCIPLES OF GRAPHIC DESIGN: THE BASICS; CHAPTER 4: SLIDE DESIGN: BEST PRACTICES; CHAPTER 5: PRESENTING FOR COMPREHENSION; CHAPTER 6: PUTTING IT ALL TOGETHER; CHAPTER 7: PREPARING GRAPHICS FOR PRODUCTION; REFERENCES; TWO
  • BUT I AM NOT AN ARTIST; INTRODUCTION; EXPERTISE INTO ILLUSTRATION; GET TO THE POINT; BUILDING BLOCKS
  • Basics of DesignGraphic Design Tools; SUMMARY; THREE
  • PRINCIPLES OF GRAPHIC DESIGN: THE BASICS; INTRODUCTION; CONTRAST, ALIGNMENT, REPETITION, PROXIMITY; CONTRAST; Utilizing Contrast in Graphic Design; Contrast: Tone; Contrast: Color; Contrast: Size; Contrast: Shape; Contrast: Texture; Alignment; Repetition; Proximity; Good Design Disappears; SUMMARY; FOUR
  • SLIDE DESIGN: BEST PRACTICES; INTRODUCTION; COMMIT THE TIME TO PLANNING AND PREPARING YOUR SLIDES AND SLIDE DECK; PRACTICE SIMPLICITY; LEVERAGE THE POWER OF VISUALS; Use a Consistent Look and Feel; USE THE RIGHT CHART
  • USE COLOR APPROPRIATELYLIMIT THE NUMBER OF FONTS; CONCLUSION; REFERENCES; FIVE
  • PRESENTING FOR COMPREHENSION; INTRODUCTION; HOW LEARNING WORKS; TARGET AUDIENCE: THE JUDGE AND JURY; THE LEARNING ENVIRONMENT: COURTROOM VERSUS CLASSROOM; EXPLANATIONS; EXPERT AS TEACHER; THE EXPERT WITNESS AS FILTER; CURSE OF KNOWLEDGE; CONCLUSION; REFERENCES; SIX
  • PUTTING IT ALL TOGETHER; INTRODUCTION; EXAMPLE GRAPHICS WITH EXPLANATION; Explanation: How Browser Caching Works; Explanation: LNK (Link Files); CASE EXAMPLE: COMPLEX TECHNICAL EXPLANATION; SUMMARY; SEVEN
  • PREPARING GRAPHICS FOR PRODUCTION
  • INTRODUCTIONUNDERSTANDING LIMITATIONS; Print; Digital; QUICK GUIDE TO PREPARING GRAPHICS; Canvas; Resolution; Content; SUMMARY; A:
  • RESOURCES FOR BETTER PRESENTATIONS; 7 DESIGN TIPS ON HOW TO MAKE AN EFFECTIVE, BEAUTIFUL POWERPOINT PRESENTATION; DESIGN RESOURCES BY CANVA; CANVA DESIGN SCHOOL; CANVA DESIGN SCHOOL RESOURCES; THE ETHOS3 BLOG: PRESENTATION TIPS AND TRICKS; SHUTTERSTOCK; ISTOCK PHOTOS; GARR REYNOLDS-PRESENTATION TIPS; SLIDE:OLOGY BY NANCY DUARTE. THE ART AND SCIENCE OF CREATING GREAT PRESENTATIONS; DUARTE.COM YOUTUBE CHANNEL; BEYOND BULLET POINTS-CLIFF ATKINSON'S WEB SITE
  • GARR REYNOLDS: WHAT IS GOOD PRESENTATION DESIGN?CRAIG BALL'S POWER PERSUASION; INDEX; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; R; S; T; V; W; Z; Back Cover
This book helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technology that help anyone understand the complex concepts behind the science.
Book
276 p. : ill., forms ; 24 cm.
  • Introduction
  • Communication in the presence of adversaries
  • On the brink of a revolution
  • The equivalent of a written signature
  • Written proof
  • Paper and state
  • The Cryptographic imagination
  • Epilogue.
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-Franois Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects. Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.
(source: Nielsen Book Data)9780262017510 20160608
Law Library (Crown)
Book
276 p. : ill. ; 24 cm.
  • Introduction
  • Communication in the presence of adversaries
  • On the brink of a revolution
  • The equivalent of a written signature
  • Written proof
  • Paper and state
  • The Cryptographic imagination
  • Epilogue.
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-Franois Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects. Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.
(source: Nielsen Book Data)9780262017510 20160608
Green Library
Book
xx, 540 p. : ill.
  • Introduction. 1. Speakeasy. 2. The Investigation Begins. 3. The Lure. 4. The Sting. 5. In Custody. 6. PayPal and eBay. 7. A (not so) Brief Primer on National Security Investigations. 8. eBay. 9. Victim Banks. 10. CTS (San Diego). 11. Verio and webcom.com. 13. The Motion to Suppress and Preliminary Skirmishing. 14. Preparing for Trial. 15. The Trial. 16. Aftermath.
  • (source: Nielsen Book Data)9781435457126 20160612
"The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals" provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers, and academics who wish to learn how to protect systems from abuse, and who wish to respond appropriately to network incidents. In addition to its value as a training tool, "The Lure" is also the true, riveting story of how two Russian hackers, who bragged that the laws in their country offered them no threat, and who mocked the inability of the FBI to catch them, were caught by an FBI lure designed to appeal to their egos and their greed. The story of the sting operation and subsequent trial is told for the first time here by the Department of Justice's attorney for the prosecution.
(source: Nielsen Book Data)9781435457126 20160612
Book
xxxiv, 362 p. ; 19 cm.
Law Library (Crown)
Journal/Periodical
volumes : illustrations, portraits ; 23 cm.
Law Library (Crown)
Book
xii, 217 pages : illustrations ; 23 cm
  • Introduction
  • Integrating electronic evidence into your family law practice
  • Preservation
  • Keeping it legal : what are legal versus illegal tactics?
  • The selection and use of experts
  • The legal mechanics of obtaining access to electronic evidence held by others
  • Appendix. Websites that track e-discovery issues.
"Issues of access to and the forensic use of electronic evidence are front and center to our social agenda—and nowhere are those issues more complicated than in family law. Who but a spouse knows your passwords and may share legal title to the accounts that control your family’s information? This...book explains the complexities of evidence as well as how to effectively integrate this knowledge into your family law practice. The authors put this information in...terms for lawyers who must speak about these issues with clients, with expert witnesses who command vast knowledge of the field, and with judges who may have little familiarity with the subject beyond sending and receiving e-mail."-- Publisher's website.
Law Library (Crown)
Book
1 online resource (194)
  • Cover; Title Page; Copyright Page; Dedication; Contents; Author Biographies; Introduction; Chapter 1
  • Your Critical Task: Learn Another Language; A Computer forensics expert looks at legalese; The Civil Lawsuit-A Pretrial Tour, with Vocabulary; The Litigation Process, Word by Word; The real first step-the triggering event; ESI in the Rules, or How to Aggravate the Judge; Keeping it in Proportion, Round 1: Training; Keeping it in Proportion, Round 2: the Price of Compliance, or Not; Chapter 2
  • Preserving, Not Corrupting-Hold It!; How far does preservation stretch? information versus evidence
  • The Hold Notice-A Brief IntroductionA historical footnote; In the Present, Spoliation Versus Integrity of Evidence; Bad Acts: Examples from Reported Cases; Destruction by Omission; Destruction by Commission; Experts (Or Not); In-house IT Employees; Outside IT "Consultants"; Outside IT Litigation Consultants; The Other Route-Destruction with Permission; Curative Action and Sanctions; The General Theory-Courts Must Maintain Their Integrity; The Balancing Act; The Hammer Falls; The Cell Door Slams, Occasionally; Each Attorney's Independent Preservation Duty
  • The Key to the Hold Notice: Name the Key Players AsapMore Thoughts About "Keys" to an Effective Hold-The Wider View; Zubulake, Pension Committee, Rimkus and More; Zubulake (I-V); The 2006 Rules Amendments on ESI; Pension Committee; Meanwhile, in Texas: Rimkus; Chin v. Port Authority-A Clarification; The Rules-Contemplating Amendment, Again; And, back in the courtroom-Sekisui American; The Rules Amendment Process, Again-Looking Forward From Dec., 2015; Chapter 3
  • Incident Response While Avoiding Evidence Disaster: The Team; The Team: Functional and Procedural Issues
  • Securing ESI Repositories: A Brief Consideration of the Dark (Criminal) SideWhen to Act in Criminal Incidents: When There is Suspicion of Misconduct; Internal Misconduct by an Individual or Group (Whether Criminal or Not); Other Criminal Misconduct, Fraud, etc., by an Individual or Group; When Something is Wrong and the Origin is Unknown: Log Access is Critical; When Immediate Action is Needed; When Criminal or Civil Litigation is Likely: Expanding the Team as Needed; When Litigation is in Progress; Who Needs to Act: Whoever Handles the Problem is on the Team; Information Technology Personnel
  • Human Resources PersonnelFinancial Personnel; Other Management Personnel; The Lawyers; In-House Counsel Team-Lawyers Plus Paralegals; Litigation Counsel Team-Lawyers Plus Paralegals; The Digital Forensic Expert or Consultant; Other Expert Consultants and Expert Witnesses; Preparing the Team; Planning-Prepare the Team for Various Situations Before Anything Happens; Identifying Key Team Positions for Various Situations; Training Individuals for Team Positions (Including Their Support Staff); Pre-Crisis Forensic and Litigation Training-The Heart of a Successful Team
The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic evidence. Corporate management personnel (legal & IT) and outside counsel need reliable processes for the litigation hold - identifying, locating, and preserving electronic evidence. Preserving Electronic Evidence for Trial provides the road map, showing you how to organize the digital evidence team before the crisis, not in the middle of litigation. This practice handbook by an internationally known digital forensics expert and an experienced litigator focuses on what corporate and litigation counsel as well as IT managers and forensic consultants need to know to communicate effectively about electronic evidence. You will find tips on how all your team members can get up to speed on each other's areas of specialization before a crisis arises. The result is a plan to effectively identify and pre-train the critical electronic-evidence team members. You will be ready to lead the team to success when a triggering event indicates that litigation is likely, by knowing what to ask in coordinating effectively with litigation counsel and forensic consultants throughout the litigation progress. Your team can also be ready for action in various business strategies, such as merger evaluation and non-litigation conflict resolution.
Book
1 online resource (1 v.) : ill., map
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations. * Learn the tools and investigative principles of both physical and digital cybercrime investigations-and how they fit together to build a solid and complete case* Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard"* The only book to combine physical and digital investigative techniques.
(source: Nielsen Book Data)9781597499859 20160711
Book
1 online resource : text file, PDF
  • Perspective Book framework Object Forensic document expertise Agenda Computational research Technology Know-how + Tools Context Expertise performance Policy landscape Closure Why computerize? Data Ecosystem Forensic fields Topics Goals + Aspects Curricula examples Gender demographics Organizations Information resources Datasets + Databases Descriptors Software Hardware Standards Health trend Links References Index Credits.
  • (source: Nielsen Book Data)9781466591912 20160612
Expert Bytes: Computer Expertise in Forensic Documents - Players, Needs, Resources and Pitfalls -introduces computer scientists and forensic document examiners to the computer expertise of forensic documents and assists them with the design of research projects in this interdisciplinary field. This is not a textbook on how to perform the actual forensic document expertise or program expertise software, but a project design guide, an anthropological inquiry, and a technology, market, and policies review. After reading this book you will have deepened your knowledge on: * What computational expertise of forensic documents is * What has been done in the field so far and what the future looks like * What the expertise is worth, what its public image is, and how to improve both * Who is doing what in the field, where, and for how much * How the expertise software functions The primary target readers are computer scientists and forensic document examiners, at the student and professional level. Paleographers, historians of science and technology, and scientific policy makers can also profit from the book. Concise and practical, featuring an attractive and functional layout design, the book is supplemented with graphical data representations, statistics, resource lists, and extensive references to facilitate further study.
(source: Nielsen Book Data)9781466591912 20160612
Book
1 online resource (ix, 198 p.) : ill.
  • Perspective Book framework Object Forensic document expertise Agenda Computational research Technology Know-how + Tools Context Expertise performance Policy landscape Closure Why computerize? Data Ecosystem Forensic fields Topics Goals + Aspects Curricula examples Gender demographics Organizations Information resources Datasets + Databases Descriptors Software Hardware Standards Health trend Links References Index Credits.
  • (source: Nielsen Book Data)9781466591912 20160612
Expert Bytes: Computer Expertise in Forensic Documents - Players, Needs, Resources and Pitfalls -introduces computer scientists and forensic document examiners to the computer expertise of forensic documents and assists them with the design of research projects in this interdisciplinary field. This is not a textbook on how to perform the actual forensic document expertise or program expertise software, but a project design guide, an anthropological inquiry, and a technology, market, and policies review. After reading this book you will have deepened your knowledge on: * What computational expertise of forensic documents is * What has been done in the field so far and what the future looks like * What the expertise is worth, what its public image is, and how to improve both * Who is doing what in the field, where, and for how much * How the expertise software functions The primary target readers are computer scientists and forensic document examiners, at the student and professional level. Paleographers, historians of science and technology, and scientific policy makers can also profit from the book. Concise and practical, featuring an attractive and functional layout design, the book is supplemented with graphical data representations, statistics, resource lists, and extensive references to facilitate further study.
(source: Nielsen Book Data)9781466591912 20160612
Book
xix, 342 p. : ill.
  • Preface xiii Acknowledgments xvii Chapter 1: The Fundamentals of Data 1 Base 2 Numbering System: Binary and Character Encoding 2 Communication in a Two-State Universe 3 Electricity and Magnetism 3 Building Blocks: The Origins of Data 4 Growing the Building Blocks of Data 5 Moving Beyond Base 2 7 American Standard Code for Information Interchange 7 Character Codes: The Basis for Processing Textual Data 10 Extended ASCII and Unicode 10 Summary 12 Notes 13 Chapter 2: Binary to Decimal 15 American Standard Code for Information Interchange 16 Computer as a Calculator 16 Why Is This Important in Forensics? 18 Data Representation 18 Converting Binary to Decimal 19 Conversion Analysis 20 A Forensic Case Example: An Application of the Math 20 Decimal to Binary: Recap for Review 22 Summary 23 Chapter 3: The Power of HEX: Finding Slivers of Data 25 What the HEX? 26 Bits and Bytes and Nibbles 27 Nibbles and Bits 29 Binary to HEX Conversion 30 Binary (HEX) Editor 34 The Needle within the Haystack 39 Summary 41 Notes 42 Chapter 4: Files 43 Opening 44 Files, File Structures, and File Formats 44 File Extensions 45 Changing a File's Extension to Evade Detection 47 Files and the HEX Editor 53 File Signature 55 ASCII Is Not Text or HEX 57 Value of File Signatures 58 Complex Files: Compound, Compressed, and Encrypted Files 59 Why Do Compound Files Exist? 60 Compressed Files 61 Forensics and Encrypted Files 64 The Structure of Ciphers 65 Summary 66 Notes 67 Appendix 4A: Common File Extensions 68 Appendix 4B: File Signature Database 73 Appendix 4C: Magic Number Defi nition 77 Appendix 4D: Compound Document Header 79 Chapter 5: The Boot Process and the Master Boot Record (MBR) 85 Booting Up 87 Primary Functions of the Boot Process 87 Forensic Imaging and Evidence Collection 90 Summarizing the BIOS 92 BIOS Setup Utility: Step by Step 92 The Master Boot Record (MBR) 96 Partition Table 102 Hard Disk Partition 103 Summary 110 Notes 111 Chapter 6: Endianness and the Partition Table 113 The Flavor of Endianness 114 Endianness 116 The Origins of Endian 117 Partition Table within the Master Boot Record 117 Summary 125 Notes 127 Chapter 7: Volume versus Partition 129 Tech Review 130 Cylinder, Head, Sector, and Logical Block Addressing 132 Volumes and Partitions 138 Summary 142 Notes 144 Chapter 8: File Systems--FAT 12/16 145 Tech Review 145 File Systems 147 Metadata 149 File Allocation Table (FAT) File System 153 Slack 157 HEX Review Note 160 Directory Entries 161 File Allocation Table (FAT) 163 How Is Cluster Size Determined? 167 Expanded Cluster Size 169 Directory Entries and the FAT 170 FAT Filing System Limitations 174 Directory Entry Limitations 176 Summary 177 Appendix 8A: Partition Table Fields 179 Appendix 8B: File Allocation Table Values 180 Appendix 8C: Directory Entry Byte Offset Description 181 Appendix 8D: FAT 12/16 Byte Offset Values 182 Appendix 8E: FAT 32 Byte Offset Values 184 Appendix 8F: The Power of 2 186 Chapter 9: File Systems--NTFS and Beyond 189 New Technology File System 189 Partition Boot Record 190 Master File Table 191 NTFS Summary 195 exFAT 196 Alternative Filing System Concepts 196 Summary 203 Notes 204 Appendix 9A: Common NTFS System Defined Attributes 205 Chapter 10: Cyber Forensics: Investigative Smart Practices 207 The Forensic Process 209 Forensic Investigative Smart Practices 211 Step 1: The Initial Contact, the Request 211 Step 2: Evidence Handling 216 Step 3: Acquisition of Evidence 221 Step 4: Data Preparation 229 Time 238 Summary 239 Note 240 Chapter 11: Time and Forensics 241 What Is Time? 241 Network Time Protocol 243 Timestamp Data 244 Keeping Track of Time 245 Clock Models and Time Bounding: The Foundations of Forensic Time 247 MS-DOS 32-Bit Timestamp: Date and Time 248 Date Determination 250 Time Determination 254 Time Inaccuracy 258 Summary 259 Notes 260 Chapter 12: Investigation: Incident Closure 263 Forensic Investigative Smart Practices 264 Step 5: Investigation (Continued) 264 Step 6: Communicate Findings 265 Characteristics of a Good Cyber Forensic Report 266 Report Contents 268 Step 7: Retention and Curation of Evidence 269 Step 8: Investigation Wrap-Up and Conclusion 273 Investigator's Role as an Expert Witness 273 Summary 279 Notes 280 Chapter 13: A Cyber Forensic Process Summary 283 Binary 284 Binary--Decimal--ASCII 285 Data Versus Code 287 HEX 288 From Raw Data to Files 288 Accessing Files 289 Endianness 290 Partitions 291 File Systems 291 Time 292 The Investigation Process 292 Summary 295 Appendix: Forensic Investigations, ABC Inc. 297 Glossary 303 About the Authors 327 Index 329.
  • (source: Nielsen Book Data)9781118273661 20160609
An explanation of the basic principles of data This book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies. The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information. It inlcudes practical examples and illustrations throughout to guide the reader.
(source: Nielsen Book Data)9781118273661 20160609

Articles+

Journal articles, e-books, & other e-resources
Articles+ results include