Download Free PDF | Computer Forensics Investigating Data and Image Files EC-Council | Press.
Contents of Computer Forensics
- CHAPTER 1. Steganography
- Objective
- Key Terms
- Introduction to Steganography
- Stegosystem Model
- Application of Steganography
- Classification of Steganography
- Technical Steganography
- Linguistic Steganography
- Digital Steganography
- Digital File Types
- Text Files
- Image Files
- Audio Files
- Video Files
- Steganographic File System
- Cryptography
- Model of a Cryptosystem
- Steganography Versus Cryptography
- Public Key Infrastructure PKI
- Watermarking
- Application of Watermarking
- Steganography Versus Watermarking
- Categories of Watermarks
- Watermarks and Compression
- Digimarc s Digital Watermarking
- Attacks on Watermarking
- Issues in Information Hiding
- Level of Visibility
- Robustness Versus Payload
- File Format Dependence
- Detecting Steganography
- Detection Techniques
- Detecting Text Image Audio and Video Steganography
- Steganalysis
- Stego Forensics
- Tools
- Mosaic
- FortKnox
- BlindSide
- S Tools
- StegHide
- Snow
- Camera Shy
- Steganos
- Pretty Good Envelope
- Gifshuffle
- JPHS
- wbStego
- OutGuess
- Invisible Secrets
- Masker
- Data Stash
- Hydan
- Cloak
- Audio Files
- Video Files
- Cryptography
- Steganography Versus Cryptography
- Public Key Infrastructure PKI
- Watermarking
- Application of Watermarking
- Steganography Versus Watermarking
- Categories of Watermarks
- Watermarks and Compression
- Digimarc s Digital Watermarking
- Attacks on Watermarking
- Issues in Information Hiding
- Level of Visibility
- Robustness Versus Payload
- File Format Dependence
- StegaNote
- Stegomagic
- Hermetic Stego
- StegParty
- Stego Suite
- StegSpy
- Stego Hunter
- WNSTORM
- Xidie
- CryptArkan
- Info Stego
- Stealth Files
- InPlainView
- EzStego
- Jpegx
- Camouflage
- Scramdisk
- CryptoBola JPEG
- Steganosaurus
- ByteShelter I
- appendX
- Z File
- MandelSteg and GIFExtract
- Chapter Summary
- Review Questions
- Hands On Projects
- CHAPTER 2. Data Acquisition and Duplication
- Objectives
- Key Terms
- Case Example
- Introduction to Data Acquisition and Duplication
- Determining the Best Acquisition Methods
- Disk To Image File
- Disk To Disk Copy
- Sparse Data Copy
- Data Recovery Contingencies
- The Need for Data Duplication
- Data Acquisition Software Tools
- Windows Standard Tools
- Linux Standard Tools
- DriveSpy
- FTK Imager
- Mount Image Pro
- Drive SnapShot
- SnapBack DatArrest
- SafeBack
- Data Acquisition Hardware Tools
- Image MASSter Solo
- LinkMASSter
- RoadMASSter
- Data Duplication Software Tools
- R Drive Image
- DriveLook
- DiskExplorer
- Save N Sync
- DFSMSdss
- SCSIPAK
- Data Duplication Hardware Tools
- ImageMASSter SAS
- Disk Jockey IT
- QuickCopy
- Chapter Summary
- Review Questions
- Hands On Projects
- Data Acquisition and Duplication
- Objectives
- Key Terms
- Case Example
- Introduction to Data Acquisition and Duplication
- Determining the Best Acquisition Methods
- Disk To Image File
- Disk To Disk Copy
- Sparse Data Copy
- Data Recovery Contingencies
- The Need for Data Duplication
- Chapter Summary
- Review Questions
- Hands On Projects
- CHAPTER 3. Forensic Investigations Using EnCase
- Objectives
- Key Terms
- Introduction to Forensic Investigation Using EnCase
- Evidence Files
- Verifying Evidence Files
- Evidence File Format
- Verifying File Integrity
- Hashing
- Acquiring an Image
- Configuring EnCase
- View Menu
- Device Tab
- Status Bar
- Searching
- Keywords
- Starting the Search
- Search Hits Tab
- Bookmarks
- Creating Bookmark Folders
- Adding Bookmarks
- Bookmarking a Selected Area
- Recovering Deleted Files Folders in a FAT Partition
- Viewing Recovered Files
- Recovering Files Folders in an NTFS Partition
- Master Boot Record MBR
- NTFS Starting Point
- Viewing Disk Geometry
- Recovering Deleted Partitions
- Hash Values
- Creating Hash Sets
- MD Hash
- Creating Hashes
- Viewers
- Signature Analysis
- Viewing the Results
- Copying Files and Folders
- E Mail Recovery
- Reporting
- EnCase Boot Disks
- Chapter Summary
- Review Questions
- Hands On Projects
- CHAPTER 4. Recovering Deleted Files and Deleted Partitions
- Objectives
- Key Terms
- Case Example
- Introduction to Recovering Deleted Files and Deleted Partitions
- Searching
- Keywords
- Starting the Search
- Search Hits Tab
- Bookmarks
- Creating Bookmark Folders
- Adding Bookmarks
- Bookmarking a Selected Area
- Recovering Deleted Files Folders in a FAT Partition
- Viewing Recovered Files
- Recovering Files Folders in an NTFS Partition
- Master Boot Record MBR
- NTFS Starting Point
- Viewing Disk Geometry
- Recovering Deleted Partitions
- Hash Values
- Creating Hash Sets
- Deleting Files
- What Happens When a File Is Deleted in Windows
- The Recycle Bin in Windows
- Damaged Recycled Folder
- How to Undelete a File
- Data Recovery in Linux
- Tools to Recover Deleted Files
- File Recovery Tools for Windows
- Tools for Use with UNIX Based Systems
- Type
- Recovering Deleted Partitions
- Deletion of a Partition
- What Happens When a Partition Is Deleted
- Recovery of Deleted Partitions
- Tools to Recover Deleted and Damaged Partitions
- Chapter Summary
- Review Questions
- Hands On Projects
- CHAPTER 5. Image File Forensics
- Objectives
- Key Terms
- Case Example
- Case Example
- Introduction to Image File Forensics
- Introduction to Image Files
- Understanding Vector Images
- Understanding Raster Images
- Understanding Image File Formats
- Data Compression in Image Files
- Understanding File Compression
- Lossless Compression Algorithms
- Lossy Compression
- Locating and Recovering Image Files
- Steganography in Image Files
- Steganalysis
- Identifying Copyright Issues with Graphics
- Chapter Summary
- Review Questions
- Hands On Projects