Contemporary digital forensic investigations of cloud and mobile applications /

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date an...

Full description

Saved in:
Bibliographic Details
Other Authors: Choo, Kim-Kwang Raymond (Editor), Dehghantanha, Ali (Editor)
Format: Electronic eBook
Language:English
Published: Cambridge, MA : Syngress, [2017]
Series:Syngress advanced topics in information security.
Subjects:
Online Access:CONNECT
CONNECT

MARC

LEADER 00000cam a2200000Ii 4500
001 mig00005040310
006 m o d
007 cr cnu---unuuu
008 161012s2017 mau ob 001 0 eng d
005 20220713133102.2
035 |a 1WRLDSHRocn965141965 
040 |a IDEBK  |b eng  |e rda  |e pn  |c IDEBK  |d OCLCO  |d YDX  |d NLE  |d OCLCF  |d OPELS  |d N$T  |d UMI  |d TOH  |d STF  |d DEBBG  |d COO  |d UPM  |d OCLCQ  |d OCL  |d D6H  |d U3W  |d CEF  |d KSU  |d OCLCQ  |d S2H  |d OCLCO 
019 |a 960902164  |a 961944591 
020 |a 9780128054482  |q (electronic bk.) 
020 |a 0128054484  |q (electronic bk.) 
020 |z 9780128053034 
020 |z 0128053038 
035 |a (OCoLC)965141965  |z (OCoLC)960902164  |z (OCoLC)961944591 
037 |a CL0500000798  |b Safari Books Online 
050 4 |a TK5103.4837 
082 0 4 |a 363.2/52  |2 23 
049 |a TXMM 
245 0 0 |a Contemporary digital forensic investigations of cloud and mobile applications /  |c edited by Kim-Kwang Raymond Choo, Ali Dehghantanha. 
264 1 |a Cambridge, MA :  |b Syngress,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Syngress advanced topics in information security 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed January 27, 2017). 
504 |a Includes bibliographical references and index. 
520 |a Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges. 
505 0 |a Machine generated contents note: 1. Contemporary Digital Forensics Investigations of Cloud and Mobile Applications / A. Dehghantanha -- References -- 2. Forensics Analysis of Android Mobile VoIP Apps / M. Conti -- 1. Introduction -- 2. Related Work -- 3. Experimental Setup -- 4. Results and Discussion -- 5. Conclusion and Future Work -- References -- 3. Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine / Z. Muda -- 1. Introduction -- 2. Related Work -- 3. Research Methodology -- 4. AIM Forensics -- 5. Conclusion and Future Work -- References -- 4. Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies / R. Mahmod -- 1. Introduction -- 2. Methodology -- 3. Experiment Setup -- 4. Discussion and Analysis -- 5. Conclusion -- References -- 5.Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies / R. Mahmod -- 1. Introduction -- 2. Experiment Setup -- 3. Discussion and Analysis -- 4. Conclusion and Future Works -- References -- 6. Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors / G. Epiphaniou -- 1. Introduction -- 2. Review of Related Work -- 3. Experiment Design -- 4. Results and Discussion -- 5. Forensics Investigation Guideline -- 6. Limitations -- 7. Conclusion and Further Research -- References -- 7. Performance of Android Forensics Data Recovery Tools / K.-K.R. Choo -- 1. Introduction -- 2. Related Work -- 3. Experiment Setup -- 4. Results and Discussions -- 5. Conclusion and Future Works -- References -- 8. Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model / A. Dehghantanha -- 1. Introduction -- 2. Experiment Setup -- 3. Findings: Dionaea -- 4. Findings: Kippo -- 5.A Conceptual EASY Training Model -- 6. Conclusion and Future Work -- Acknowledgments -- References -- 9. Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory / K.-K.R. Choo -- 1. Introduction -- 2. Background and Related Work -- 3. Methodology -- 4. Cyber Threat Landscape From a Rat Perspective -- 5. Discussion -- 6. Conclusion and Future Work -- Appendix 1 Questionnaire Items -- References -- 10. Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics / Z. Yunos -- 1. Introduction -- 2. Our Proposed Antiforensics Framework for Digital CCTV Systems -- 3. Case Studies -- 4. Conclusion -- References -- 11. Forensic Visualization: Survey and Future Research Directions / K.-K.R. Choo -- 1. Introduction -- 2. Digital Forensics -- 3. Visualization is Key -- 4. Forensic Visualization Selection Criteria -- 5. Conclusion and Future Research -- References -- 12. Investigating Storage as a Service Cloud Platform: pCloud as a Case Study / M. Conti -- 1. Introduction -- 2. Research Methodology -- 3. Analysis and Findings -- 4.Network Traffic -- 5. Conclusion -- References -- 13. Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud / K.-K.R. Choo -- 1. Introduction -- 2. Research Methodology -- 3. Findings: SpiderOak -- 4. Findings: JustCloud -- 5. Finding: pCloud -- 6. Conclusion and Future Work -- References -- 14. Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies / T. Dargahi -- 1. Introduction -- 2. Research Methodology -- 3. Results and Discussion -- 4. Reporting and Presentation -- 5. Conclusion -- References -- 15. An Android Cloud Storage Apps Forensic Taxonomy / A. Dehghantanha -- 1. Introduction -- 2. Experiment Setup -- 3. Discussion -- 4. Results -- 5. Conclusion and Future Works -- Appendix 1 List of Application Versions -- Appendix 2 Dataset List (EDRM) -- Appendix 3 Retrieved Artifacts -- Appendix 4 Network Traffic -- References. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
590 |a ScienceDirect eBook - Forensics and Security 2017 [EBCFOR17] 
650 0 |a Mobile device forensics. 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Cloud computing. 
650 0 |a Forensic sciences. 
700 1 |a Choo, Kim-Kwang Raymond,  |e editor. 
700 1 |a Dehghantanha, Ali,  |e editor. 
730 0 |a WORLDSHARE SUB RECORDS 
830 0 |a Syngress advanced topics in information security. 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780128054482/?ar  |z CONNECT  |3 O'Reilly  |t 0 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://www.sciencedirect.com/science/book/9780128053034  |z CONNECT  |3 Elsevier 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 356552f2-6ae0-4770-a853-1b1c725f8475  |i 1ede49b0-053e-4b5a-9793-592adfcde98a  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e TK5103.4837   |h Library of Congress classification 
856 4 0 |3 Elsevier  |t 0  |u https://ezproxy.mtsu.edu/login?url=https://www.sciencedirect.com/science/book/9780128053034  |z CONNECT 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780128054482/?ar  |z CONNECT