เข้าสู่ระบบ หรือ สมัครสมาชิก
ข้อมูลบรรณานุกรม  #1141400    

ความนิยม
ประเภทวัสดุ หนังสือ
ชื่อเรื่องDigital forensics : threatscape and best practices / edited by John Sammons
Dewey Call #005.8 Di 2016
ผู้แต่งเพิ่มเติมSammons, John
หัวเรื่องCOMPUTER CRIMES--INVESTIGATION
ISBN9780128045268
พิมพลักษณ์United States: Syngress is an imprint of Elsevier, 2016
ชื่อเรื่องDigital forensics : threatscape and best practices / edited by John Sammons
Dewey Call #005.8 Di 2016
ผู้แต่งเพิ่มเติมSammons, John
ISBN9780128045268
พิมพลักษณ์United States: Syngress is an imprint of Elsevier, 2016
เนื้อหาThe Cryptocurrency Enigma / Preston Miller -- Purpose -- Introduction -- What Makes a Currency? -- Cryptocurrency -- Public Key Encryption Basics -- Forensic Relevance -- Bitcoin -- History and Current Context -- Bitcoin Framework -- Blockchain -- Wallets and Addresses -- Transaction -- Verification -- Mining -- Blockchain Explorers -- Bitcoin Protocol -- Forensic Artifacts -- Multibit HD -- Blockchain Transaction Details -- Multibit Log -- The Bitcoin Protocol in Action -- Inv Packet -- Getdata Packet -- TX Paçket -- Summary -- References -- The Key to Forensic Success: Examination Planning is a Key Determinant of Efficient and Effective Digital Forensics / Mark Pollitt -- Introduction -- The Four Phases of Digital Forensics -- It is a Matter of Questions -- Investigative Questions -- Legal Questions -- Forensic Questions -- Identification -- Classification/Individualization -- Association -- Reconstruction -- Forensic Questions as a Bridge -- Developing Forensic Hypotheses -- Knowing How Far To Go -- Starting the Plan -- How Do You Know When You are Done? -- Examination Phase - Data Extraction -- The Forensic Analysis -- The Examination Planning Process -- Conclusion -- Examination Planning References -- Psychological Profiling as An Investigative Tool for Digital Forensics / Marcus K. Rogers -- Current Model -- Issues -- Volume of Data -- Lack of Context -- Accountability -- New Model -- Phases -- Classification -- Context Analysis -- Collection -- Statistical Analysis -- Timeline Analysis/Visualization -- Decision/Opinion -- Limitations -- Case Studies -- Shaken Baby Death -- Arson Homicide -- Possession of Child Porn -- Conclusions -- References -- The Intersection Between Social Media, Crime, and Digital Forensics: #WhoDunlt? / Kathryn C. Seigfried-Spellar, Sean C. Leshney -- Introduction -- Social Media and Crime -- Social Media and Digital Forensics -- Social Media Evidence on the Network -- Social Media Evidence on the Physical Device -- Summary -- References -- Mobile Device Forensics: Threats, Challenges, and Future Trends / Josh Brunty -- Introduction -- The Hardware Versus Software Complexity Trend -- Cloud Services and Mobile Platforms - Inherent Vulnerabilities -- There is an App for that - Forensic Challenges and Threats Within Apps -- Social Media Apps -- Native and Non-Native Messaging Apps -- Multimedia and VOIP "Streaming" Apps -- Cloud-Based Storage Apps -- Camera-Enabled Apps -- Location Data and Apps -- Geotaggmg and EXIF Data Within Apps -- Persistent Threats and Challenges - What Lies Ahead for Mobile Device Forensics -- Data Encryption and Stronger Passwords -- "Burner'" and Chinese Phones -- JTAG and Chipoff Analysis - Advantages, Challenges, and Threats -- Validation and Best Practices of Mobile Forensic Tools and Methods - the Forensic Enigma -- Conclusion -- References -- Digital Forensics in an eDiscovery World / Rob Attoe -- Introduction -- eDiscovery Processes and EDRM -- Cat or Dog not Mouse -- Cat w/10 Dog -- Digital Investigations Workflows -- References -- OS X El Capitan Forensics / Shawn Jordan -- Introduction -- Default Directory Structure -- Root Directory -- Applications -- Bin/Shin -- Library/System -- Private -- Usr -- Var -- User -- User's Directory -- .Cups -- .Ssh -- .Trash -- Desktop/documents/.DS_Store -- Pictures -- iMovie -- {User Name}/Library -- Accounts -- Application Support/Call History -- Caches -- Calendar -- Mail -- Mail Downloads -- Messages -- Notes -- New Features in OS X 10.11 El Capitan -- Conclusion -- Quick Reference Table -- Works Cited -- Cybercrimes: An Overview of Contemporary Challenges and Impending Threats / Kimberly A. DeTardo-Bora, Dhruba J. Bora -- Combating Cybercrimes -- Current Cybercrimes and Evolving Threats -- Hacking -- Identity Theft and Fraud -- Cyberstalking and Digital Harassment -- Child Sexual Exploitation and Pornography -- Future Issues for Law Enforcement and Digital Forensic Analysts -- References -- Legal / Margaret Phipps Brown -- Introduction -- The Fourth Amendment -- Search Warrants -- Federal Privacy Legislation -- Drones -- Tracking Vehicles -- Tracking Cell Phones -- Automated License Plate Readers -- Cell Phones -- Encryption -- Encryption and Cell Phones -- The Internet of Things -- The Dark Web -- Malware -- Looking Ahead -- References
หัวเรื่องCOMPUTER CRIMES--INVESTIGATION
ลักษณะทางกายภาพ160 p. : ill
LDR 04917nam a2200193 4500
005 20180618105432.0
008 180618s2016 xxua ||| | eng d
020__‡a9780128045268‡c2747
040__‡aSongkhla Rajabhat University
08204‡a005.8‡bDi 2016
24510‡aDigital forensics :‡bthreatscape and best practices /‡cedited by John Sammons
260__‡aUnited States:‡bSyngress is an imprint of Elsevier, 2016
300__‡a160 p. : ‡bill
504__‡aบรรณานุกรม: หน้า 147-150
5050_‡aThe Cryptocurrency Enigma / Preston Miller -- Purpose -- Introduction -- What Makes a Currency? -- Cryptocurrency -- Public Key Encryption Basics -- Forensic Relevance -- Bitcoin -- History and Current Context -- Bitcoin Framework -- Blockchain -- Wallets and Addresses -- Transaction -- Verification -- Mining -- Blockchain Explorers -- Bitcoin Protocol -- Forensic Artifacts -- Multibit HD -- Blockchain Transaction Details -- Multibit Log -- The Bitcoin Protocol in Action -- Inv Packet -- Getdata Packet -- TX Paçket -- Summary -- References -- The Key to Forensic Success: Examination Planning is a Key Determinant of Efficient and Effective Digital Forensics / Mark Pollitt -- Introduction -- The Four Phases of Digital Forensics -- It is a Matter of Questions -- Investigative Questions -- Legal Questions -- Forensic Questions -- Identification -- Classification/Individualization -- Association -- Reconstruction -- Forensic Questions as a Bridge -- Developing Forensic Hypotheses -- Knowing How Far To Go -- Starting the Plan -- How Do You Know When You are Done? -- Examination Phase - Data Extraction -- The Forensic Analysis -- The Examination Planning Process -- Conclusion -- Examination Planning References -- Psychological Profiling as An Investigative Tool for Digital Forensics / Marcus K. Rogers -- Current Model -- Issues -- Volume of Data -- Lack of Context -- Accountability -- New Model -- Phases -- Classification -- Context Analysis -- Collection -- Statistical Analysis -- Timeline Analysis/Visualization -- Decision/Opinion -- Limitations -- Case Studies -- Shaken Baby Death -- Arson Homicide -- Possession of Child Porn -- Conclusions -- References -- The Intersection Between Social Media, Crime, and Digital Forensics: #WhoDunlt? / Kathryn C. Seigfried-Spellar, Sean C. Leshney -- Introduction -- Social Media and Crime -- Social Media and Digital Forensics -- Social Media Evidence on the Network -- Social Media Evidence on the Physical Device -- Summary -- References -- Mobile Device Forensics: Threats, Challenges, and Future Trends / Josh Brunty -- Introduction -- The Hardware Versus Software Complexity Trend -- Cloud Services and Mobile Platforms - Inherent Vulnerabilities -- There is an App for that - Forensic Challenges and Threats Within Apps -- Social Media Apps -- Native and Non-Native Messaging Apps -- Multimedia and VOIP "Streaming" Apps -- Cloud-Based Storage Apps -- Camera-Enabled Apps -- Location Data and Apps -- Geotaggmg and EXIF Data Within Apps -- Persistent Threats and Challenges - What Lies Ahead for Mobile Device Forensics -- Data Encryption and Stronger Passwords -- "Burner'" and Chinese Phones -- JTAG and Chipoff Analysis - Advantages, Challenges, and Threats -- Validation and Best Practices of Mobile Forensic Tools and Methods - the Forensic Enigma -- Conclusion -- References -- Digital Forensics in an eDiscovery World / Rob Attoe -- Introduction -- eDiscovery Processes and EDRM -- Cat or Dog not Mouse -- Cat w/10 Dog -- Digital Investigations Workflows -- References -- OS X El Capitan Forensics / Shawn Jordan -- Introduction -- Default Directory Structure -- Root Directory -- Applications -- Bin/Shin -- Library/System -- Private -- Usr -- Var -- User -- User's Directory -- .Cups -- .Ssh -- .Trash -- Desktop/documents/.DS_Store -- Pictures -- iMovie -- {User Name}/Library -- Accounts -- Application Support/Call History -- Caches -- Calendar -- Mail -- Mail Downloads -- Messages -- Notes -- New Features in OS X 10.11 El Capitan -- Conclusion -- Quick Reference Table -- Works Cited -- Cybercrimes: An Overview of Contemporary Challenges and Impending Threats / Kimberly A. DeTardo-Bora, Dhruba J. Bora -- Combating Cybercrimes -- Current Cybercrimes and Evolving Threats -- Hacking -- Identity Theft and Fraud -- Cyberstalking and Digital Harassment -- Child Sexual Exploitation and Pornography -- Future Issues for Law Enforcement and Digital Forensic Analysts -- References -- Legal / Margaret Phipps Brown -- Introduction -- The Fourth Amendment -- Search Warrants -- Federal Privacy Legislation -- Drones -- Tracking Vehicles -- Tracking Cell Phones -- Automated License Plate Readers -- Cell Phones -- Encryption -- Encryption and Cell Phones -- The Internet of Things -- The Dark Web -- Malware -- Looking Ahead -- References
650_0‡aCOMPUTER CRIMES‡xINVESTIGATION
7001_‡aSammons, John
850__‡aSKRU
เลือกห้องสมุด :
 บาร์โค้ดเลขหมู่/เล่มที่Collectionห้องสมุดสาขาสถานที่จัดเก็บสถานะ
E23433005.8 Di 2016English Bookสำนักวิทยบริการและเทคโนโลยีสารสนเทศ มหาวิทยาลัยราชภัฏสงขลา อ.บรรณราชนครินทร์ ชั้น 5   อยู่บนชั้น
 
เพิ่มความเห็น
ชื่อของคุณ
ความเห็น
เพิ่มบทวิเคราะห์
ชื่อของคุณ
เนื้อหา
เพิ่มรายการ
ชื่อเรื่อง
สร้างใน
เก็บในโฟลเดอร์เดียวกันทุกรายการ
สร้างโฟลเดอร์
ชื่อโฟลเดอร์
ผลลัพธ์การเพิ่มรายการ
สงวนลิขสิทธิ์ © 2555, มหาวิทยาลัยสงขลานครินทร์ สงวนสิทธิ์ทั้งหมด