Browse content
Table of contents
Actions for selected chapters
- Full text access
- Book chapterAbstract only
Chapter 1 - Digital Forensics and Analyzing Data
Pages 1-38 - Book chapterAbstract only
Chapter 2 - Seizure of Digital Information
Pages 39-91 - Book chapterAbstract only
Chapter 3 - Introduction to Handheld Forensics
Pages 93-112 - Book chapterAbstract only
Chapter 4 - PDA, Blackberry, and iPod Forensic Analysis
Pages 113-146 - Book chapterAbstract only
Chapter 5 - E-mail Forensics
Pages 147-169 - Book chapterAbstract only
Chapter 6 - Router Forensics
Pages 171-187 - Book chapterAbstract only
Chapter 7 - Legal Issues of Intercepting WiFi Transmissions
Pages 189-208 - Book chapterAbstract only
Chapter 8 - CD and DVD Forensics
Pages 209-268 - Book chapterAbstract only
Chapter 9 - MP3 Forensics
Pages 269-294 - Book chapterNo access
Index
Pages 295-315
About the book
Description
Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.
Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.
Key Features
- Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense
- Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else
- Today the industry has exploded and cyber investigators can be found in almost every field
- Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense
- Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else
- Today the industry has exploded and cyber investigators can be found in almost every field
Details
ISBN
978-1-59749-163-1
Language
English
Published
2007
Copyright
Copyright © 2007 Elsevier Inc. All rights reserved
Imprint
Syngress