Hiding behind the keyboard: uncovering covert communication methods with forensic analysis
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate c...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress
[2016]
|
Schlagworte: | |
Online-Zugang: | FAW01 FLA01 Volltext |
Zusammenfassung: | Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xviii, 236 pages) |
ISBN: | 9780128033524 0128033525 9780128033401 0128033401 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044390251 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170630s2016 |||| o||u| ||||||eng d | ||
020 | |a 9780128033524 |9 978-0-12-803352-4 | ||
020 | |a 0128033525 |9 0-12-803352-5 | ||
020 | |a 9780128033401 |9 978-0-12-803340-1 | ||
020 | |a 0128033401 |9 0-12-803340-1 | ||
035 | |a (ZDB-33-ESD)ocn944961027 | ||
035 | |a (OCoLC)944961027 | ||
035 | |a (DE-599)BVBBV044390251 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 363.232 |2 23 | |
100 | 1 | |a Shavers, Brett |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hiding behind the keyboard |b uncovering covert communication methods with forensic analysis |c Brett Shaves, John Bair |
264 | 1 | |a Cambridge, MA |b Syngress |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 online resource (xviii, 236 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals | ||
650 | 7 | |a BUSINESS & ECONOMICS / Infrastructure |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE / General |2 bisacsh | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Undercover operations | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Cryptography | |
700 | 1 | |a Bair, John |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128033401 |z 0128033401 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128033401 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029792473 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780128033401 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128033401 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804177662290165760 |
---|---|
any_adam_object | |
author | Shavers, Brett Bair, John |
author_facet | Shavers, Brett Bair, John |
author_role | aut aut |
author_sort | Shavers, Brett |
author_variant | b s bs j b jb |
building | Verbundindex |
bvnumber | BV044390251 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn944961027 (OCoLC)944961027 (DE-599)BVBBV044390251 |
dewey-full | 363.232 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.232 |
dewey-search | 363.232 |
dewey-sort | 3363.232 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02549nmm a2200493zc 4500</leader><controlfield tag="001">BV044390251</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170630s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128033524</subfield><subfield code="9">978-0-12-803352-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128033525</subfield><subfield code="9">0-12-803352-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128033401</subfield><subfield code="9">978-0-12-803340-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128033401</subfield><subfield code="9">0-12-803340-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn944961027</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)944961027</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044390251</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.232</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shavers, Brett</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hiding behind the keyboard</subfield><subfield code="b">uncovering covert communication methods with forensic analysis</subfield><subfield code="c">Brett Shaves, John Bair</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 236 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Infrastructure</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Undercover operations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bair, John</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128033401</subfield><subfield code="z">0128033401</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128033401</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029792473</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128033401</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128033401</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044390251 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:51:38Z |
institution | BVB |
isbn | 9780128033524 0128033525 9780128033401 0128033401 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029792473 |
oclc_num | 944961027 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 online resource (xviii, 236 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Syngress |
record_format | marc |
spelling | Shavers, Brett Verfasser aut Hiding behind the keyboard uncovering covert communication methods with forensic analysis Brett Shaves, John Bair Cambridge, MA Syngress [2016] © 2016 1 online resource (xviii, 236 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisïŽexposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Wirtschaft Undercover operations Data encryption (Computer science) Cryptography Bair, John aut Erscheint auch als Druck-Ausgabe 9780128033401 0128033401 http://www.sciencedirect.com/science/book/9780128033401 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Shavers, Brett Bair, John Hiding behind the keyboard uncovering covert communication methods with forensic analysis BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Wirtschaft Undercover operations Data encryption (Computer science) Cryptography |
title | Hiding behind the keyboard uncovering covert communication methods with forensic analysis |
title_auth | Hiding behind the keyboard uncovering covert communication methods with forensic analysis |
title_exact_search | Hiding behind the keyboard uncovering covert communication methods with forensic analysis |
title_full | Hiding behind the keyboard uncovering covert communication methods with forensic analysis Brett Shaves, John Bair |
title_fullStr | Hiding behind the keyboard uncovering covert communication methods with forensic analysis Brett Shaves, John Bair |
title_full_unstemmed | Hiding behind the keyboard uncovering covert communication methods with forensic analysis Brett Shaves, John Bair |
title_short | Hiding behind the keyboard |
title_sort | hiding behind the keyboard uncovering covert communication methods with forensic analysis |
title_sub | uncovering covert communication methods with forensic analysis |
topic | BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Wirtschaft Undercover operations Data encryption (Computer science) Cryptography |
topic_facet | BUSINESS & ECONOMICS / Infrastructure SOCIAL SCIENCE / General Wirtschaft Undercover operations Data encryption (Computer science) Cryptography |
url | http://www.sciencedirect.com/science/book/9780128033401 |
work_keys_str_mv | AT shaversbrett hidingbehindthekeyboarduncoveringcovertcommunicationmethodswithforensicanalysis AT bairjohn hidingbehindthekeyboarduncoveringcovertcommunicationmethodswithforensicanalysis |