Normal view MARC view ISBD view

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis

By: Shavers, Brett
Title By: Bair, John | Leibrock, Larry [Technical editor]
Material type: BookPublisher: Amsterdam : Elsevier, c2016.Description: xviii, 236 p. : ill. ; 24 cm.ISBN: 9780128033401Subject(s): Undercover operations | Data encryption (Computer science) | Cryptography | BUSINESS & ECONOMICS / Infrastructure | SOCIAL SCIENCE / GeneralDDC classification: 363.232 SH HI Online resources: Location Map
Summary:
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
363.232 SH HI (Browse shelf) Available T0011832
Total holds: 0

Introduction Chapter 1: Laying the Foundation of Covert Communications Chapter 2: The Tor Browser Chapter 3: Triaging Mobile Evidence Chapter 4: Mobile Extraction Issues Chapter 5: Data Hiding Chapter 6: Cryptography and Encryption Chapter 7: Anti-Forensics Chapter 8: Electronic Intercepts Chapter 9: Digital Identity Chapter 10: Putting it All Together Chapter 11: Closing Thoughts.

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

Powered by Koha