Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
By: Shavers, Brett
Title By: Bair, John | Leibrock, Larry [Technical editor]
Material type: BookPublisher: Amsterdam : Elsevier, c2016.Description: xviii, 236 p. : ill. ; 24 cm.ISBN: 9780128033401Subject(s): Undercover operations | Data encryption (Computer science) | Cryptography | BUSINESS & ECONOMICS / Infrastructure | SOCIAL SCIENCE / GeneralDDC classification: 363.232 SH HI Online resources: Location MapItem type | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 363.232 SH HI (Browse shelf) | Available | T0011832 |
Introduction Chapter 1: Laying the Foundation of Covert Communications Chapter 2: The Tor Browser Chapter 3: Triaging Mobile Evidence Chapter 4: Mobile Extraction Issues Chapter 5: Data Hiding Chapter 6: Cryptography and Encryption Chapter 7: Anti-Forensics Chapter 8: Electronic Intercepts Chapter 9: Digital Identity Chapter 10: Putting it All Together Chapter 11: Closing Thoughts.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.