Learn to pull adigital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at anot yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes. * Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense * Book presents qone of a kindq bleeding edge information that absolutely can not be found anywhere else * Today the industry has exploded and cyber investigators can be found in almost every fieldThe Apple iPod family currently comprises five generations of devices for the primary units and two generations ... Fifth Generation iPod The next generation introduced a video function and lyrics support. ... The iPod nano uses USB connections with FireWire for charging www.syngress.com PDA, Blackberry, and iPodanbsp;...
|Title||:||Alternate Data Storage Forensics|
|Author||:||Amber Schroader, Tyler Cohen|
|Publisher||:||Elsevier - 2011-04-18|