Computer Forensics Investigating Data and Image Files EC-Council | Press

Computer Forensics Investigating Data and Image Files

Download Free PDF | Computer Forensics Investigating Data and Image Files EC-Council | Press.

Contents of Computer Forensics

  • CHAPTER 1. Steganography
  • Objective
  • Key Terms
  • Introduction to Steganography
  • Stegosystem Model
  • Application of Steganography
  • Classification of Steganography
  • Technical Steganography
  • Linguistic Steganography
  • Digital Steganography
  • Digital File Types
  • Text Files
  • Image Files
  • Audio Files
  • Video Files
  • Steganographic File System
  • Cryptography
  • Model of a Cryptosystem
  • Steganography Versus Cryptography
  • Public Key Infrastructure PKI
  • Watermarking
  • Application of Watermarking
  • Steganography Versus Watermarking
  • Categories of Watermarks
  • Watermarks and Compression
  • Digimarc s Digital Watermarking
  • Attacks on Watermarking
  • Issues in Information Hiding
  • Level of Visibility
  • Robustness Versus Payload
  • File Format Dependence
  • Detecting Steganography
  • Detection Techniques
  • Detecting Text Image Audio and Video Steganography
  • Steganalysis
  • Stego Forensics
  • Tools
  • Mosaic
  • FortKnox
  • BlindSide
  • S Tools
  • StegHide
  • Snow
  • Camera Shy
  • Steganos
  • Pretty Good Envelope
  • Gifshuffle
  • JPHS
  • wbStego
  • OutGuess
  • Invisible Secrets
  • Masker
  • Data Stash
  • Hydan
  • Cloak
  • Audio Files
  • Video Files
  • Cryptography
  • Steganography Versus Cryptography
  • Public Key Infrastructure PKI
  • Watermarking
  • Application of Watermarking
  • Steganography Versus Watermarking
  • Categories of Watermarks
  • Watermarks and Compression
  • Digimarc s Digital Watermarking
  • Attacks on Watermarking
  • Issues in Information Hiding
  • Level of Visibility
  • Robustness Versus Payload
  • File Format Dependence
  • StegaNote
  • Stegomagic
  • Hermetic Stego
  • StegParty
  • Stego Suite
  • StegSpy
  • Stego Hunter
  • WNSTORM
  • Xidie
  • CryptArkan
  • Info Stego
  • Stealth Files
  • InPlainView
  • EzStego
  • Jpegx
  • Camouflage
  • Scramdisk
  • CryptoBola JPEG
  • Steganosaurus
  • ByteShelter I
  • appendX
  • Z File
  • MandelSteg and GIFExtract
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • CHAPTER 2. Data Acquisition and Duplication
  • Objectives
  • Key Terms
  • Case Example
  • Introduction to Data Acquisition and Duplication
  • Determining the Best Acquisition Methods
  • Disk To Image File
  • Disk To Disk Copy
  • Sparse Data Copy
  • Data Recovery Contingencies
  • The Need for Data Duplication
  • Data Acquisition Software Tools
  • Windows Standard Tools
  • Linux Standard Tools
  • DriveSpy
  • FTK Imager
  • Mount Image Pro
  • Drive SnapShot
  • SnapBack DatArrest
  • SafeBack
  • Data Acquisition Hardware Tools
  • Image MASSter Solo
  • LinkMASSter
  • RoadMASSter
  • Data Duplication Software Tools
  • R Drive Image
  • DriveLook
  • DiskExplorer
  • Save N Sync
  • DFSMSdss
  • SCSIPAK
  • Data Duplication Hardware Tools
  • ImageMASSter SAS
  • Disk Jockey IT
  • QuickCopy
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • Data Acquisition and Duplication
  • Objectives
  • Key Terms
  • Case Example
  • Introduction to Data Acquisition and Duplication
  • Determining the Best Acquisition Methods
  • Disk To Image File
  • Disk To Disk Copy
  • Sparse Data Copy
  • Data Recovery Contingencies
  • The Need for Data Duplication
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • CHAPTER 3. Forensic Investigations Using EnCase
  • Objectives
  • Key Terms
  • Introduction to Forensic Investigation Using EnCase
  • Evidence Files
  • Verifying Evidence Files
  • Evidence File Format
  • Verifying File Integrity
  • Hashing
  • Acquiring an Image
  • Configuring EnCase
  • View Menu
  • Device Tab
  • Status Bar
  • Searching
  • Keywords
  • Starting the Search
  • Search Hits Tab
  • Bookmarks
  • Creating Bookmark Folders
  • Adding Bookmarks
  • Bookmarking a Selected Area
  • Recovering Deleted Files Folders in a FAT Partition
  • Viewing Recovered Files
  • Recovering Files Folders in an NTFS Partition
  • Master Boot Record MBR
  • NTFS Starting Point
  • Viewing Disk Geometry
  • Recovering Deleted Partitions
  • Hash Values
  • Creating Hash Sets
  • MD Hash
  • Creating Hashes
  • Viewers
  • Signature Analysis
  • Viewing the Results
  • Copying Files and Folders
  • E Mail Recovery
  • Reporting
  • EnCase Boot Disks
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • CHAPTER 4. Recovering Deleted Files and Deleted Partitions
  • Objectives
  • Key Terms
  • Case Example
  • Introduction to Recovering Deleted Files and Deleted Partitions
  • Searching
  • Keywords
  • Starting the Search
  • Search Hits Tab
  • Bookmarks
  • Creating Bookmark Folders
  • Adding Bookmarks
  • Bookmarking a Selected Area
  • Recovering Deleted Files Folders in a FAT Partition
  • Viewing Recovered Files
  • Recovering Files Folders in an NTFS Partition
  • Master Boot Record MBR
  • NTFS Starting Point
  • Viewing Disk Geometry
  • Recovering Deleted Partitions
  • Hash Values
  • Creating Hash Sets
  • Deleting Files
  • What Happens When a File Is Deleted in Windows
  • The Recycle Bin in Windows
  • Damaged Recycled Folder
  • How to Undelete a File
  • Data Recovery in Linux
  • Tools to Recover Deleted Files
  • File Recovery Tools for Windows
  • Tools for Use with UNIX Based Systems
  • Type
  • Recovering Deleted Partitions
  • Deletion of a Partition
  • What Happens When a Partition Is Deleted
  • Recovery of Deleted Partitions
  • Tools to Recover Deleted and Damaged Partitions
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • CHAPTER 5. Image File Forensics
  • Objectives
  • Key Terms
  • Case Example
  • Case Example
  • Introduction to Image File Forensics
  • Introduction to Image Files
  • Understanding Vector Images
  • Understanding Raster Images
  • Understanding Image File Formats
  • Data Compression in Image Files
  • Understanding File Compression
  • Lossless Compression Algorithms
  • Lossy Compression
  • Locating and Recovering Image Files
  • Steganography in Image Files
  • Steganalysis
  • Identifying Copyright Issues with Graphics
  • Chapter Summary
  • Review Questions
  • Hands On Projects
Share book:

Request your PDF Book

Write the name of the book in detail (Name, Author, Edition...)
Click or drag a file to this area to upload.

What's the problem with this file?

Attention !

Help us remove any copyrighted material that may be posted on our site.

We ask you to inform us of any infringing material that may be unintentionally published on our site to remove it.

Reach us at: [email protected]

Attention !

Help us remove any copyrighted material that may be posted on our site.

We ask you to inform us of any infringing material that may be unintentionally published on our site to remove it.

Reach us at: [email protected]