Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
By: Shavers, Brett
Title By: Bair, John | Leibrock, Larry [Technical editor]
Material type: BookPublisher: Amsterdam : Elsevier, c2016.Description: xviii, 236 p. : ill. ; 24 cm.ISBN: 9780128033401Subject(s): Undercover operations | Data encryption (Computer science) | Cryptography | BUSINESS & ECONOMICS / Infrastructure | SOCIAL SCIENCE / GeneralDDC classification: 363.232 SH HI Online resources: Location MapItem type | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 363.232 SH HI (Browse shelf) | Available | T0011832 |
, Shelving location: Main Collection Close shelf browser
363.20977311 LU WA The war on neighborhoods : | 363.209944 PR EN Enemies of the state / | 363.232 PO LI Police brutality / | 363.232 SH HI Hiding behind the keyboard : | 363.25 GO GU A guide to forensic accounting investigation / | 363.25 GO GU A guide to forensic accounting investigation / | 363.25 HA GO Google earth forensics : |
Introduction Chapter 1: Laying the Foundation of Covert Communications Chapter 2: The Tor Browser Chapter 3: Triaging Mobile Evidence Chapter 4: Mobile Extraction Issues Chapter 5: Data Hiding Chapter 6: Cryptography and Encryption Chapter 7: Anti-Forensics Chapter 8: Electronic Intercepts Chapter 9: Digital Identity Chapter 10: Putting it All Together Chapter 11: Closing Thoughts.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.