Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital forensics (4)
- Computer forensics (3)
- Computer security (2)
- Cybercrime (2)
- Book review (1)
-
- Computer forensics education (1)
- Cryptography (1)
- Cyberspace forensics (1)
- Digital security (1)
- Expert testimony (1)
- Forensic analysis (1)
- Information assurance (1)
- Information warfare (1)
- Internet security (1)
- Macintosh operating systems (1)
- Network forensics (1)
- Personal privacy (1)
- Phishing (1)
- Protocol analysis (1)
- Social networks (1)
Articles 1 - 10 of 10
Full-Text Articles in Information Security
An Overview Of Cryptography (Updated Version 26 February 2017), Gary C. Kessler
An Overview Of Cryptography (Updated Version 26 February 2017), Gary C. Kessler
Gary C. Kessler
There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered here only describe the first of many steps necessary for better security in any number of situations.
Book Review: No Place To Hide, Gary C. Kessler
Book Review: No Place To Hide, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of No Place to Hide, by Robert O'Harrow, Jr. Free Press, 2006. ISBN 0-7432-8705-3.
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of Conquest in Cyberspace: National Security and Information Warfare, by Martin C. Libicki. Cambridge University Press, 2007. ISBN 978-0-521-69214-4
Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler
Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of Challenges to Digital Forensic Evidence, by Fred Cohen. Fred Cohen & Associates, 2008. ISBN 1-878109-41-3
Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler
Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of The dotCrime Manifesto: How to Stop Internet Crime, by Phillip Hallam-Baker. Addison-Wesley, 2008. ISBN: 0-321-50358-9
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of MAC OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, edited by Jesse Varsalone. Syngress, 2009. ISBN: 978-1-59749-297-3.
Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler
Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, edited by Kenneth J. Knapp. Information Science Reference, 2009. ISBN: 978-1-60566-326-5.
An Overview Of Steganography For The Computer Forensics Examiner (Updated Version, February 2015), Gary C. Kessler
An Overview Of Steganography For The Computer Forensics Examiner (Updated Version, February 2015), Gary C. Kessler
Gary C. Kessler
"Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information …
Book Review: Digital Forensic Evidence Examination, Gary C. Kessler
Book Review: Digital Forensic Evidence Examination, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of the second edition of Digital Forensic Evidence Examination by Fred Cohen. ASP Press, 2010. ISBN: 978-1-878109-45-3
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
Gary C. Kessler
"Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies."