Computer Forensics Investigating Data and Image Files EC-Council | Press

Computer Forensics Investigating Data and Image Files

Download Free PDF | Computer Forensics Investigating Data and Image Files EC-Council | Press.

Contents of Computer Forensics

  • CHAPTER 1. Steganography
  • Objective
  • Key Terms
  • Introduction to Steganography
  • Stegosystem Model
  • Application of Steganography
  • Classification of Steganography
  • Technical Steganography
  • Linguistic Steganography
  • Digital Steganography
  • Digital File Types
  • Text Files
  • Image Files
  • Audio Files
  • Video Files
  • Steganographic File System
  • Cryptography
  • Model of a Cryptosystem
  • Steganography Versus Cryptography
  • Public Key Infrastructure PKI
  • Watermarking
  • Application of Watermarking
  • Steganography Versus Watermarking
  • Categories of Watermarks
  • Watermarks and Compression
  • Digimarc s Digital Watermarking
  • Attacks on Watermarking
  • Issues in Information Hiding
  • Level of Visibility
  • Robustness Versus Payload
  • File Format Dependence
  • Detecting Steganography
  • Detection Techniques
  • Detecting Text Image Audio and Video Steganography
  • Steganalysis
  • Stego Forensics
  • Tools
  • Mosaic
  • FortKnox
  • BlindSide
  • S Tools
  • StegHide
  • Snow
  • Camera Shy
  • Steganos
  • Pretty Good Envelope
  • Gifshuffle
  • JPHS
  • wbStego
  • OutGuess
  • Invisible Secrets
  • Masker
  • Data Stash
  • Hydan
  • Cloak
  • Audio Files
  • Video Files
  • Cryptography
  • Steganography Versus Cryptography
  • Public Key Infrastructure PKI
  • Watermarking
  • Application of Watermarking
  • Steganography Versus Watermarking
  • Categories of Watermarks
  • Watermarks and Compression
  • Digimarc s Digital Watermarking
  • Attacks on Watermarking
  • Issues in Information Hiding
  • Level of Visibility
  • Robustness Versus Payload
  • File Format Dependence
  • StegaNote
  • Stegomagic
  • Hermetic Stego
  • StegParty
  • Stego Suite
  • StegSpy
  • Stego Hunter
  • WNSTORM
  • Xidie
  • CryptArkan
  • Info Stego
  • Stealth Files
  • InPlainView
  • EzStego
  • Jpegx
  • Camouflage
  • Scramdisk
  • CryptoBola JPEG
  • Steganosaurus
  • ByteShelter I
  • appendX
  • Z File
  • MandelSteg and GIFExtract
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • CHAPTER 2. Data Acquisition and Duplication
  • Objectives
  • Key Terms
  • Case Example
  • Introduction to Data Acquisition and Duplication
  • Determining the Best Acquisition Methods
  • Disk To Image File
  • Disk To Disk Copy
  • Sparse Data Copy
  • Data Recovery Contingencies
  • The Need for Data Duplication
  • Data Acquisition Software Tools
  • Windows Standard Tools
  • Linux Standard Tools
  • DriveSpy
  • FTK Imager
  • Mount Image Pro
  • Drive SnapShot
  • SnapBack DatArrest
  • SafeBack
  • Data Acquisition Hardware Tools
  • Image MASSter Solo
  • LinkMASSter
  • RoadMASSter
  • Data Duplication Software Tools
  • R Drive Image
  • DriveLook
  • DiskExplorer
  • Save N Sync
  • DFSMSdss
  • SCSIPAK
  • Data Duplication Hardware Tools
  • ImageMASSter SAS
  • Disk Jockey IT
  • QuickCopy
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • Data Acquisition and Duplication
  • Objectives
  • Key Terms
  • Case Example
  • Introduction to Data Acquisition and Duplication
  • Determining the Best Acquisition Methods
  • Disk To Image File
  • Disk To Disk Copy
  • Sparse Data Copy
  • Data Recovery Contingencies
  • The Need for Data Duplication
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • CHAPTER 3. Forensic Investigations Using EnCase
  • Objectives
  • Key Terms
  • Introduction to Forensic Investigation Using EnCase
  • Evidence Files
  • Verifying Evidence Files
  • Evidence File Format
  • Verifying File Integrity
  • Hashing
  • Acquiring an Image
  • Configuring EnCase
  • View Menu
  • Device Tab
  • Status Bar
  • Searching
  • Keywords
  • Starting the Search
  • Search Hits Tab
  • Bookmarks
  • Creating Bookmark Folders
  • Adding Bookmarks
  • Bookmarking a Selected Area
  • Recovering Deleted Files Folders in a FAT Partition
  • Viewing Recovered Files
  • Recovering Files Folders in an NTFS Partition
  • Master Boot Record MBR
  • NTFS Starting Point
  • Viewing Disk Geometry
  • Recovering Deleted Partitions
  • Hash Values
  • Creating Hash Sets
  • MD Hash
  • Creating Hashes
  • Viewers
  • Signature Analysis
  • Viewing the Results
  • Copying Files and Folders
  • E Mail Recovery
  • Reporting
  • EnCase Boot Disks
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • CHAPTER 4. Recovering Deleted Files and Deleted Partitions
  • Objectives
  • Key Terms
  • Case Example
  • Introduction to Recovering Deleted Files and Deleted Partitions
  • Searching
  • Keywords
  • Starting the Search
  • Search Hits Tab
  • Bookmarks
  • Creating Bookmark Folders
  • Adding Bookmarks
  • Bookmarking a Selected Area
  • Recovering Deleted Files Folders in a FAT Partition
  • Viewing Recovered Files
  • Recovering Files Folders in an NTFS Partition
  • Master Boot Record MBR
  • NTFS Starting Point
  • Viewing Disk Geometry
  • Recovering Deleted Partitions
  • Hash Values
  • Creating Hash Sets
  • Deleting Files
  • What Happens When a File Is Deleted in Windows
  • The Recycle Bin in Windows
  • Damaged Recycled Folder
  • How to Undelete a File
  • Data Recovery in Linux
  • Tools to Recover Deleted Files
  • File Recovery Tools for Windows
  • Tools for Use with UNIX Based Systems
  • Type
  • Recovering Deleted Partitions
  • Deletion of a Partition
  • What Happens When a Partition Is Deleted
  • Recovery of Deleted Partitions
  • Tools to Recover Deleted and Damaged Partitions
  • Chapter Summary
  • Review Questions
  • Hands On Projects
  • CHAPTER 5. Image File Forensics
  • Objectives
  • Key Terms
  • Case Example
  • Case Example
  • Introduction to Image File Forensics
  • Introduction to Image Files
  • Understanding Vector Images
  • Understanding Raster Images
  • Understanding Image File Formats
  • Data Compression in Image Files
  • Understanding File Compression
  • Lossless Compression Algorithms
  • Lossy Compression
  • Locating and Recovering Image Files
  • Steganography in Image Files
  • Steganalysis
  • Identifying Copyright Issues with Graphics
  • Chapter Summary
  • Review Questions
  • Hands On Projects

Request your PDF Book

Write the name of the book in detail (Name, Author, Edition...)

What's the problem with this file?