Wireless Crime and Forensic InvestigationCRC Press, 26. 2. 2007. - 280 страница Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. From short text messaging to investigating war, this book explores all aspects of wireless technology, including how it is used in daily life and how it might be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and the forensic investigation techniques that are used for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques, and wireless crime techniques, and shows how to conduct forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, is self-contained for quick comprehension. |
Садржај
Chapter 1 Overview of Wireless Technologies and Security | 1 |
Chapter 2 Wireless Threats Vulnerabilities and Security | 13 |
Chapter 3 Wireless Crime Fighting | 43 |
Chapter 4 Digital Forensic Principles and Wireless Forensics | 51 |
Chapter 5 The Wireless Future | 127 |
Glossary | 153 |
Computer Fraud and Abuse Act 1986 US 18 USC 1030 | 191 |
Communications Interception Act | 197 |
Acronyms | 229 |
The 80211 Alphabet | 239 |
| 245 | |
Back cover | 253 |
Друга издања - Прикажи све
Wireless Crime and Forensic Investigation Gregory Kipper,Taylor & Francis Group Приказ није доступан - 2007 |
Чести термини и фразе
access point Acquisition Wizard allows applications attack Attorney authorized BlackBerry BlackBerry devices Bluetooth Card Seizure CDMA cell phone Cell Seizure cellular devices chapter Code connection cordless Crime and Forensic data associated desktop Division Multiple Access e-mail electronic communication encryption evidence Federal Forensic Investigation fraud frequency Grafedia hacker handheld handset HotSync identity theft integrated interception interface Internet law enforcement Mbps mobile devices mobile phones modulation offense operating system oral Packet Palm Paraben's password PDA devices PDA Seizure person Protocol provider radio RFID SANS Institute Seizure Acquisition ShotCode signal SIM card Spread Spectrum SSID standard storage subscriber subsection Telecommunications telephone traffic transmission transmitted typically United users violation virtual communities voice war-driving Wi-Fi Windows Windows CE wire or electronic Wireless Crime wireless devices wireless LAN wireless network wireless technology WLAN
