Cover for Alternate Data Storage Forensics

Alternate Data Storage Forensics

Book2007

Authors:

Tyler Cohen and Amber Schroader

Alternate Data Storage Forensics

Book2007

 

Cover for Alternate Data Storage Forensics

Authors:

Tyler Cohen and Amber Schroader

Browse this book

Book description

Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterAbstract only

    Chapter 1 - Digital Forensics and Analyzing Data

    Pages 1-38

  3. Book chapterAbstract only

    Chapter 2 - Seizure of Digital Information

    Pages 39-91

  4. Book chapterAbstract only

    Chapter 3 - Introduction to Handheld Forensics

    Pages 93-112

  5. Book chapterAbstract only

    Chapter 4 - PDA, Blackberry, and iPod Forensic Analysis

    Pages 113-146

  6. Book chapterAbstract only

    Chapter 5 - E-mail Forensics

    Pages 147-169

  7. Book chapterAbstract only

    Chapter 6 - Router Forensics

    Pages 171-187

  8. Book chapterAbstract only

    Chapter 7 - Legal Issues of Intercepting WiFi Transmissions

    Pages 189-208

  9. Book chapterAbstract only

    Chapter 8 - CD and DVD Forensics

    Pages 209-268

  10. Book chapterAbstract only

    Chapter 9 - MP3 Forensics

    Pages 269-294

  11. Book chapterNo access

    Index

    Pages 295-315

About the book

Description

Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.

Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.

Key Features

  • Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense
  • Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else
  • Today the industry has exploded and cyber investigators can be found in almost every field
  • Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense
  • Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else
  • Today the industry has exploded and cyber investigators can be found in almost every field

Details

ISBN

978-1-59749-163-1

Language

English

Published

2007

Copyright

Copyright © 2007 Elsevier Inc. All rights reserved

Imprint

Syngress

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Authors

Tyler Cohen

Amber Schroader