• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Placing the suspect behind the keyboard :

پدید آورنده
Brett Shavers, Harlan Carvey, Technical Editor.

موضوع
Computer crimes-- Investigation.,Criminal investigation.,Criminal procedure.,Electronic evidence.

رده
HV8079
.
C65
S437
2013

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025
مشاهده در قفسه مجازی
RIS Bibtex ISO

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1597499854 (alk. paper)
(Number (ISBN
9781597499859 (alk. paper)

NATIONAL BIBLIOGRAPHY NUMBER

Number
b420972

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Placing the suspect behind the keyboard :
General Material Designation
[Book]
Other Title Information
using digital forensics and investigative techniques to identify cybercrime suspects /
First Statement of Responsibility
Brett Shavers, Harlan Carvey, Technical Editor.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xxii, 267 pages :
Other Physical Details
illustrations ;
Dimensions
25 cm

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Machine generated contents note: ch. 1 Introduction -- Digital Evidence Collection -- Simple File Copying -- "Dead Box" Approaches -- "Live Box" Approaches -- Decision-Making FlowChart -- Preview/Triage -- SmartPhones and Cellular Devices -- GPS -- Summary -- Bibliography -- ch. 2 High Tech Interview -- Introduction -- The Main Goal of Questioning a Suspect -- The Line of Questions for Suspects -- Computer Skills, Ability, and Knowledge -- Password, Encryption, Steganography, and Deletion -- Control of the Device(s) in Question -- Other Devices Used by Suspect -- Software Used by Suspect -- Internet Use by Suspect -- Online Chat, Email, Forums, Boards, Online Social Networking -- Peer-to-Peer Networking -- File Storage -- Crime Specific -- Child Pornography -- Crime Specific -- Identity Theft -- Other Alleged Crimes -- Questions for Victims -- Computer Crime Victim Questions -- Identity Theft -- Computer Crime Victim Questions -- Harassment Via Email/Text/Online Postings -- Questions for Network Administrators -- Customer Accounts -- Internet Service Provider, Online Data Hosting, Other Online Services -- Summary -- Bibliography -- ch. 3 Physical Investigations -- Introduction -- Hazards of Acting Upon Minimal Information -- Physical Surveillance -- Mobile Surveillance -- Aerial Surveillance -- Video Surveillance -- Covertly Installed Cameras -- Other Sources of Surveillance Records -- Surveillance Notes and Timelines -- Electronic Surveillance -- Oral Intercepts -- Dialed Number Recorders -- Trash Runs -- Tracking Cell Phones -- Vehicle Tracking -- Keystroke Logging -- Consumer Purchase Records -- Obtaining Personal Information -- Undercover and Informant Operations -- Witnesses -- Neighbors as Surveillance Agents -- Deconfliction -- Summary -- Bibliography -- Further Reading -- ch. 4 Technical Investigations -- Introduction -- Digital Investigative Techniques -- What is a Person? -- Who? What? When? Why? Where? And How? -- Location -- Time -- Wireless Connections -- Network (Cloud) Connections -- Photos and Videos -- Internet Evidence (Mobile Devices, Computers, and Game Systems) -- Texts and Emails -- Calendar Evidence -- "Other" Device Forensics -- Online Social Networking -- User Activity -- User logins -- User-Specific Computer Activity -- Digital Authorship -- Profiling -- Biological Forensic Evidence -- Triage and Previews -- Summary -- Bibliography -- Further Reading -- ch. 5 Putting It All Together -- "2+2 = Putting It All Together" -- The Evidence as a Whole -- Avoiding Assumptions -- Who Did It? -- Timelines -- Follow the Evidence -- Computer User Activity -- Rabbit Holes -- Summary -- Bibliography -- ch. 6 Investigative Case Management -- Introduction -- Basic Case Tracking -- The Case Name -- Note Taking -- Analyzing Your Notes -- Analysis with Spreadsheets -- Analysis with Databases -- Analysis Using Charts -- Analysis Using Maps -- Fresh Set of Eyes -- Summary -- Bibliography -- ch. 7 Case Presentation -- Introduction -- It's Not Whether You Win or Lose -- Investigative Mindset -- Your Audience -- Preparation -- Organizing Case Information -- Value of Visuals -- Presentation Media -- Slideshows and Animations -- Charts and Diagrams -- The Suspect's Machine -- Analogies -- Avoid TMI (Too Much Information) -- Your Presentation -- Summary -- Bibliography -- ch. 8 Cheat Sheets and Quickstart Guides -- Introduction -- Cheat Sheets and Quickstart Guides -- Turnover Folders -- Visual Aids -- Investigative Aids -- Study Guides -- Make Your Own -- Checklists -- Summary -- Bibliography -- ch. 9 Some Things Will Become Easier, Others Not So Much -- Introduction -- It Will Become Easier to Place a Suspect Behind the Keyboard -- Operating Systems Will Make It Easier -- Computer Hardware and Software Applications Will Make It Easier -- New and Innovative Computing Devices Will Make It Easier -- Data Storage and Access Will Make It Easier -- Public Awareness and Education Will Make It Easier -- The Suspect Will Make It Easier -- Pre-Placed Surveillance Systems Will Make It Easier -- New Laws and Employer Rights Will Make It Easier -- It Will Become More Difficult to Place a Suspect Behind the Keyboard -- Encryption Will Make It More Difficult -- Public awareness Will Make It More Difficult -- Remote Control of Systems Will Make It More Difficult -- Open Wi-Fi Hotspots Will Make It More Difficult -- Massive and Duplicate Data Will Make It More Difficult -- Virtual Machines Will Make It More Difficult -- Even More Techniques Will Make It Difficult -- Summary -- Bibliography -- ch. 10 Online Investigations -- Introduction -- Online Investigations -- Why the Internet? -- What Can Be Found Online? -- How to Build Your "Super" Browser -- Internet Search Engines and Directories -- Usernames -- Social Networking Websites -- Blogs, Forums, and Wikis -- The Dark Web -- Following the Bread Crumbs -- Capturing Webpages as Evidence -- Be Careful of Your Visits Online -- Summary -- Bibliography -- ch. 11 Case Studies -- Introduction -- A Day in the Life of a Cybercriminal -- Backdating Documents -- False Names and Disposable Email Accounts -- Evidence Leads to More Evidence -- Searching for All the Bad Things -- Scenario -- Threatening Blog Posts -- Making the Wrong Kind of Friends Online -- A Break in the Case, Otherwise Known as a Suspect's Mistake -- Altered Evidence and Spoliation -- Spoofed Call Harassment -- Disgruntled Employee Steals and Deletes Employer's Data -- Missing Evidence -- Bomb Threats by Email -- ID the Suspect -- Online Extortion -- Placing Suspect at a Location -- Placing the Suspect in the Office at a Specific Location -- Stolen Property -- IP Addresses Aren't Enough -- Planted Evidence -- The Life and Casework of a Cyber Investigator -- Technical Knowledge and Skills -- This Case is Different from That Case -- Testifying to Your Work -- Summary -- Bibliography.
0

TOPICAL NAME USED AS SUBJECT

Computer crimes-- Investigation.
Criminal investigation.
Criminal procedure.
Electronic evidence.

DEWEY DECIMAL CLASSIFICATION

Number
363
.
25/968
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
HV8079
.
C65
Book number
S437
2013

PERSONAL NAME - PRIMARY RESPONSIBILITY

Shavers, Brett.

ORIGINATING SOURCE

Date of Transaction
20130716100259.0
Cataloguing Rules (Descriptive Conventions))
rda

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival