27%
Cyber Forensics: From Data to Digital Evidence(Wiley Corporate F&A)

Cyber Forensics: From Data to Digital Evidence(Wiley Corporate F&A)

          
5
4
3
2
1

Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist
X

About the Book

An explanation of the basic principles of data This book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies.  The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information.  It inlcudes practical examples and illustrations throughout to guide the reader.

Table of Contents:
Preface xiii Acknowledgments xvii Chapter 1: The Fundamentals of Data 1 Base 2 Numbering System: Binary and Character Encoding 2 Communication in a Two-State Universe 3 Electricity and Magnetism 3 Building Blocks: The Origins of Data 4 Growing the Building Blocks of Data 5 Moving Beyond Base 2 7 American Standard Code for Information Interchange 7 Character Codes: The Basis for Processing Textual Data 10 Extended ASCII and Unicode 10 Summary 12 Notes 13 Chapter 2: Binary to Decimal 15 American Standard Code for Information Interchange 16 Computer as a Calculator 16 Why Is This Important in Forensics? 18 Data Representation 18 Converting Binary to Decimal 19 Conversion Analysis 20 A Forensic Case Example: An Application of the Math 20 Decimal to Binary: Recap for Review 22 Summary 23 Chapter 3: The Power of HEX: Finding Slivers of Data 25 What the HEX? 26 Bits and Bytes and Nibbles 27 Nibbles and Bits 29 Binary to HEX Conversion 30 Binary (HEX) Editor 34 The Needle within the Haystack 39 Summary 41 Notes 42 Chapter 4: Files 43 Opening 44 Files, File Structures, and File Formats 44 File Extensions 45 Changing a File’s Extension to Evade Detection 47 Files and the HEX Editor 53 File Signature 55 ASCII Is Not Text or HEX 57 Value of File Signatures 58 Complex Files: Compound, Compressed, and Encrypted Files 59 Why Do Compound Files Exist? 60 Compressed Files 61 Forensics and Encrypted Files 64 The Structure of Ciphers 65 Summary 66 Notes 67 Appendix 4A: Common File Extensions 68 Appendix 4B: File Signature Database 73 Appendix 4C: Magic Number Defi nition 77 Appendix 4D: Compound Document Header 79 Chapter 5: The Boot Process and the Master Boot Record (MBR) 85 Booting Up 87 Primary Functions of the Boot Process 87 Forensic Imaging and Evidence Collection 90 Summarizing the BIOS 92 BIOS Setup Utility: Step by Step 92 The Master Boot Record (MBR) 96 Partition Table 102 Hard Disk Partition 103 Summary 110 Notes 111 Chapter 6: Endianness and the Partition Table 113 The Flavor of Endianness 114 Endianness 116 The Origins of Endian 117 Partition Table within the Master Boot Record 117 Summary 125 Notes 127 Chapter 7: Volume versus Partition 129 Tech Review 130 Cylinder, Head, Sector, and Logical Block Addressing 132 Volumes and Partitions 138 Summary 142 Notes 144 Chapter 8: File Systems—FAT 12/16 145 Tech Review 145 File Systems 147 Metadata 149 File Allocation Table (FAT) File System 153 Slack 157 HEX Review Note 160 Directory Entries 161 File Allocation Table (FAT) 163 How Is Cluster Size Determined? 167 Expanded Cluster Size 169 Directory Entries and the FAT 170 FAT Filing System Limitations 174 Directory Entry Limitations 176 Summary 177 Appendix 8A: Partition Table Fields 179 Appendix 8B: File Allocation Table Values 180 Appendix 8C: Directory Entry Byte Offset Description 181 Appendix 8D: FAT 12/16 Byte Offset Values 182 Appendix 8E: FAT 32 Byte Offset Values 184 Appendix 8F: The Power of 2 186 Chapter 9: File Systems—NTFS and Beyond 189 New Technology File System 189 Partition Boot Record 190 Master File Table 191 NTFS Summary 195 exFAT 196 Alternative Filing System Concepts 196 Summary 203 Notes 204 Appendix 9A: Common NTFS System Defined Attributes 205 Chapter 10: Cyber Forensics: Investigative Smart Practices 207 The Forensic Process 209 Forensic Investigative Smart Practices 211 Step 1: The Initial Contact, the Request 211 Step 2: Evidence Handling 216 Step 3: Acquisition of Evidence 221 Step 4: Data Preparation 229 Time 238 Summary 239 Note 240 Chapter 11: Time and Forensics 241 What Is Time? 241 Network Time Protocol 243 Timestamp Data 244 Keeping Track of Time 245 Clock Models and Time Bounding: The Foundations of Forensic Time 247 MS-DOS 32-Bit Timestamp: Date and Time 248 Date Determination 250 Time Determination 254 Time Inaccuracy 258 Summary 259 Notes 260 Chapter 12: Investigation: Incident Closure 263 Forensic Investigative Smart Practices 264 Step 5: Investigation (Continued) 264 Step 6: Communicate Findings 265 Characteristics of a Good Cyber Forensic Report 266 Report Contents 268 Step 7: Retention and Curation of Evidence 269 Step 8: Investigation Wrap-Up and Conclusion 273 Investigator’s Role as an Expert Witness 273 Summary 279 Notes 280 Chapter 13: A Cyber Forensic Process Summary 283 Binary 284 Binary—Decimal—ASCII 285 Data Versus Code 287 HEX 288 From Raw Data to Files 288 Accessing Files 289 Endianness 290 Partitions 291 File Systems 291 Time 292 The Investigation Process 292 Summary 295 Appendix: Forensic Investigations, ABC Inc. 297 Glossary 303 About the Authors 327 Index 329


Best Sellers


Product Details
  • ISBN-13: 9781118273661
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Depth: 32
  • Language: English
  • Returnable: N
  • Spine Width: 30 mm
  • Weight: 566 gr
  • ISBN-10: 1118273664
  • Publisher Date: 15 May 2012
  • Binding: Hardback
  • Height: 236 mm
  • No of Pages: 368
  • Series Title: Wiley Corporate F&A
  • Sub Title: From Data to Digital Evidence
  • Width: 161 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Cyber Forensics: From Data to Digital Evidence(Wiley Corporate F&A)
John Wiley & Sons Inc -
Cyber Forensics: From Data to Digital Evidence(Wiley Corporate F&A)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber Forensics: From Data to Digital Evidence(Wiley Corporate F&A)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA