本文主要是介绍Alternate Data Storage Forensics,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvpLearn to pull digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at not yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.
* Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense* Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else
* Today the industry has exploded and cyber investigators can be found in almost every field
http://rapidshare.com/files/127780748/1597491632.rar
这篇关于Alternate Data Storage Forensics的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!