This is an interim version of our Electronic Legal Deposit Catalogue-eJournals and eBooks while we continue to recover from a cyber-attack.
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis /: uncovering covert communication methods with forensic analysis. (2016)
Record Type:
Book
Title:
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis /: uncovering covert communication methods with forensic analysis. (2016)
Main Title:
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
Introduction Chapter 1: Laying the Foundation of Covert Communications Chapter 2: The Tor Browser Chapter 3: Triaging Mobile Evidence Chapter 4: Mobile Extraction Issues Chapter 5: Data Hiding Chapter 6: Cryptography and Encryption Chapter 7: Anti-Forensics Chapter 8: Electronic Intercepts Chapter 9: Digital Identity Chapter 10: Putting it All Together Chapter 11: Closing Thoughts
Note: Description based on CIP data; item not viewed.
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.