Skip to Content
Cyber Forensics: From Data to Digital Evidence
book

Cyber Forensics: From Data to Digital Evidence

by Frederic Guillossou, Albert J. Marcella
May 2012
Beginner
342 pages
8h 6m
English
Wiley
Content preview from Cyber Forensics: From Data to Digital Evidence

CHAPTER TWO

Binary to Decimal

IN CHAPTER 1 WE INTRODUCED the basic concepts of numbering systems and how data is moved and manipulated. The life cycle of data, from its humble beginnings as electronic bits and bytes, evolving into characters, then words, finally emerging as a language, then as information and eventually into potential evidence. Understanding how evidence emerges from data, is pivotal in successful forensic investigations.

We continue now in the next step of our cyber forensic learning process, moving from our humble binary beginnings of our two-state world, growing now beyond binary to decimal and back again, gaining a deeper understanding of the math behind the forensics and how a knowledge of the math is essential in understanding even the most basic cyber forensic investigation.

So, as we probe deeper into an understanding of what happens behind the flash and sizzle of forensics, let’s begin where we left off.

AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE

The history of ASCII and its development were discussed at length previously, and we now know that the characters identified by 2 ^ 7 or 128-bit unique characters are known as American Standard Code for Information Interchange/extended ASCII or just ASCII.

ASCII characters are assigned a decimal value because binary cannot be directly converted to ASCII, and silicon-based computing devices can only compute in binary math. However, binary can be converted into a decimal value, and this decimal value is ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

Babak Akhgar, Andrew Staniforth, Francesca Bosco
Cyber Crime Investigations

Cyber Crime Investigations

James Steele, Anthony Reyes, Richard Brittson, Kevin O'Shea
Digital Triage Forensics

Digital Triage Forensics

Stephen Pearson, Richard Watson

Publisher Resources

ISBN: 9781118273661Purchase book