Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital forensics (4)
- Computer forensics (3)
- Computer security (2)
- Cybercrime (2)
- Book review (1)
-
- Computer forensics education (1)
- Cyberspace forensics (1)
- Digital security (1)
- Expert testimony (1)
- Forensic analysis (1)
- Information assurance (1)
- Information warfare (1)
- Internet security (1)
- Macintosh operating systems (1)
- Network forensics (1)
- Personal privacy (1)
- Phishing (1)
- Protocol analysis (1)
- Social networks (1)
Articles 1 - 9 of 9
Full-Text Articles in Information Security
Book Review: No Place To Hide, Gary C. Kessler
Book Review: No Place To Hide, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of No Place to Hide, by Robert O'Harrow, Jr. Free Press, 2006. ISBN 0-7432-8705-3.
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of Conquest in Cyberspace: National Security and Information Warfare, by Martin C. Libicki. Cambridge University Press, 2007. ISBN 978-0-521-69214-4
Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler
Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of Challenges to Digital Forensic Evidence, by Fred Cohen. Fred Cohen & Associates, 2008. ISBN 1-878109-41-3
Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler
Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of The dotCrime Manifesto: How to Stop Internet Crime, by Phillip Hallam-Baker. Addison-Wesley, 2008. ISBN: 0-321-50358-9
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of MAC OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, edited by Jesse Varsalone. Syngress, 2009. ISBN: 978-1-59749-297-3.
Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler
Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, edited by Kenneth J. Knapp. Information Science Reference, 2009. ISBN: 978-1-60566-326-5.
An Overview Of Steganography For The Computer Forensics Examiner (Updated Version, February 2015), Gary C. Kessler
An Overview Of Steganography For The Computer Forensics Examiner (Updated Version, February 2015), Gary C. Kessler
Gary C. Kessler
"Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information …
Book Review: Digital Forensic Evidence Examination, Gary C. Kessler
Book Review: Digital Forensic Evidence Examination, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of the second edition of Digital Forensic Evidence Examination by Fred Cohen. ASP Press, 2010. ISBN: 978-1-878109-45-3
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
Gary C. Kessler
"Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies."