000 | 01979nam a2200253 a 4500 | ||
---|---|---|---|
999 |
_c30503 _d30503 |
||
001 | 65500 | ||
020 | _a9780128033401 | ||
082 | _a363.232 SH HI | ||
100 |
_aShavers, Brett _954493 |
||
245 | 1 | 0 |
_aHiding behind the keyboard : _buncovering covert communication methods with forensic analysis _cBrett Shavers, John Bair ; Technical editor Larry Leibrock |
260 |
_aAmsterdam : _bElsevier, _cc2016. |
||
300 |
_axviii, 236 p. : _bill. ; _c24 cm. |
||
505 | 0 | _aIntroduction Chapter 1: Laying the Foundation of Covert Communications Chapter 2: The Tor Browser Chapter 3: Triaging Mobile Evidence Chapter 4: Mobile Extraction Issues Chapter 5: Data Hiding Chapter 6: Cryptography and Encryption Chapter 7: Anti-Forensics Chapter 8: Electronic Intercepts Chapter 9: Digital Identity Chapter 10: Putting it All Together Chapter 11: Closing Thoughts. | |
520 | _aHiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. | ||
650 | 7 |
_aUndercover operations _954494 |
|
650 | 7 |
_aData encryption (Computer science) _95422 |
|
650 | 7 |
_aCryptography _95423 |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Infrastructure _918030 |
|
650 | 7 |
_aSOCIAL SCIENCE / General _91343 |
|
700 |
_aBair, John _954495 |
||
700 |
_aLeibrock, Larry, _eTechnical editor _954496 |
||
856 |
_uhttps://uowd.box.com/s/pwm1hp4otarqak79455ek1zyjydfbaqm _zLocation Map |
||
942 |
_cREGULAR _2ddc |