000 01979nam a2200253 a 4500
999 _c30503
_d30503
001 65500
020 _a9780128033401
082 _a363.232 SH HI
100 _aShavers, Brett
_954493
245 1 0 _aHiding behind the keyboard :
_buncovering covert communication methods with forensic analysis
_cBrett Shavers, John Bair ; Technical editor Larry Leibrock
260 _aAmsterdam :
_bElsevier,
_cc2016.
300 _axviii, 236 p. :
_bill. ;
_c24 cm.
505 0 _aIntroduction Chapter 1: Laying the Foundation of Covert Communications Chapter 2: The Tor Browser Chapter 3: Triaging Mobile Evidence Chapter 4: Mobile Extraction Issues Chapter 5: Data Hiding Chapter 6: Cryptography and Encryption Chapter 7: Anti-Forensics Chapter 8: Electronic Intercepts Chapter 9: Digital Identity Chapter 10: Putting it All Together Chapter 11: Closing Thoughts.
520 _aHiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
650 7 _aUndercover operations
_954494
650 7 _aData encryption (Computer science)
_95422
650 7 _aCryptography
_95423
650 7 _aBUSINESS & ECONOMICS / Infrastructure
_918030
650 7 _aSOCIAL SCIENCE / General
_91343
700 _aBair, John
_954495
700 _aLeibrock, Larry,
_eTechnical editor
_954496
856 _uhttps://uowd.box.com/s/pwm1hp4otarqak79455ek1zyjydfbaqm
_zLocation Map
942 _cREGULAR
_2ddc