000 | 01698nam a22003497a 4500 | ||
---|---|---|---|
001 | 30226 | ||
003 | OSt | ||
005 | 20250515121227.0 | ||
008 | 160113s2016 ne a b 001 0 eng | ||
020 |
_a9780128033401 _q(hardback) |
||
020 |
_a0128033401 _q(hardback) |
||
040 |
_aDLC _cDLC _erda _beng |
||
082 | 7 | 4 |
_223 _a363.232 _bS533 |
100 | 1 |
_aShavers, Brett, _eauthor. |
|
245 | 1 | 0 |
_aHiding behind the keyboard : _buncovering covert communication methods with forensic analysis / _cBrett Shavers, John Bair ; Larry Leibrock, technical editor. |
264 | 1 |
_aAmsterdam : _aBoston: _bElsevier, _c[2016] |
|
264 | 4 | _c©2016 | |
300 |
_axviii, 236 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _aHiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows practitioners and investigators how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. | ||
650 | 4 | _aUndercover operations. | |
650 | 4 | _aCryptography. | |
700 | 1 |
_aBair, John, _eauthor. |
|
700 | 1 |
_aLeibrock, Larry _eeditor. |
|
910 | _asaja | ||
942 |
_2ddc _cBK |
||
999 |
_c30226 _d30226 |