Skip to Content
Cyber Forensics: From Data to Digital Evidence
book

Cyber Forensics: From Data to Digital Evidence

by Frederic Guillossou, Albert J. Marcella
May 2012
Beginner
342 pages
8h 6m
English
Wiley
Content preview from Cyber Forensics: From Data to Digital Evidence

Index

Access Data

Active partition

Address:

HEX editor address panel

Logical Block Address (LBA)

Adobe

Advanced Encryption Standard (AES)

Apple/Macintosh:

boot process in

endian designation by

file extensions for

file signature information for

file systems of

hard drive removal from

operating systems

ASCII (American Standard Code for Information Interchange):

binary and decimal values assigned to

extended

HEX equivalent to

overview of

Bad clusters

Base 2 numbering system. See also Binary system

Binary system:

ASCII equivalents to

binary (HEX) editor

binary tree filing system

bits as building blocks of

b-tree filing system

character codes using (see also ASCII; Hexadecimal characters; Unicode)

decimal equivalents of

electricity and magnetism relationship to

exponents/power of 2 in

fundamentals of

HEX representation of

origins of data in

BIOS (Basic Input Output System)

$Bitmap

Bits:

ASCII coding scheme using

as binary system building blocks

bit-for-bit imaging of evidence

bytes as eight (see also Bytes)

exponential combinations of

HEX system using

as origins of data

Unicode/UCS using

Books, cataloging of

Boot process:

BIOS function in

boot device sequence

booting up

boot loader in

evidence corruption during

file mounting in

HEX editor in

Master Boot Record in

partitions/partition table in

POST function in

setup utility in

signature words in

summary of

Volume Boot Record in

write blocking or protection in

Braille Encoding System

Bytes:

byte offsets

character codes using

cluster ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

Babak Akhgar, Andrew Staniforth, Francesca Bosco
Cyber Crime Investigations

Cyber Crime Investigations

James Steele, Anthony Reyes, Richard Brittson, Kevin O'Shea
Digital Triage Forensics

Digital Triage Forensics

Stephen Pearson, Richard Watson

Publisher Resources

ISBN: 9781118273661Purchase book