Privacy Protection and Computer Forensics.

By: Caloyannides, MichaelMaterial type: TextTextPublisher: Norwood : Artech House, 2004Copyright date: ©2004Edition: 2nd edDescription: 1 online resource (366 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781580538312Subject(s): Computer security | Data protection | Forensic sciencesGenre/Form: Electronic books.Additional physical formats: Print version:: Privacy Protection and Computer ForensicsDDC classification: 005.8 LOC classification: QA76.9.A25 -- C348 2004ebOnline resources: Click to View
Contents:
Contents -- Table of Contents -- Introduction -- 1 Computer Forensics -- 1.1 What is Computer Forensics -- 1.2 Why is computer forensics of vital interest to you? 1 -- 1.3 If you have done nothing illegal, you have nothing to fear: not true anywhere! 6 -- 1.4 Computer forensics 8 -- 2 Locating Your Sensitive Data in Your Computer -- 2.1 Deleting does not deleteŠwhat does? 23 -- 2.2 Where is the sensitive data hiding? 32 -- 2.3 The swap file as a source of forensic data 36 -- 2.4 The Registry as a source of forensic data 39 -- 3 Specialized Forensics Applications -- 3.1 Digital watermarking 45 -- 3.2 The British RIP Act and the US Carnivore (DCS1000) 49 -- 4 How Can Sensitive Data Be Stolen From One's Computer? -- 4.1 Physical possession of one™s computer 53 -- 4.2 Temporary physical access to one™s computer 53 -- 4.3 Commercial hardware keystroke loggers 54 -- 4.4 Commercial software keystroke loggers 57 -- 4.5 Going online 58 -- 4.6 Spyware in your computer 60 -- 4.7 van Eck radiation using commercially available systems 64 -- 4.8 Being on a network, cable modem, or xDSL modem 69 -- 4.9 Other means 70 -- 4.10 Insertion of incriminating data in your computer by others 70 -- 4.11 Security protection steps that don™t work well enough 71 -- 5 Why Computer Privacy and Anonymity? -- 5.1 Anonymity 79 -- 5.2 Privacy 82 -- 6 Practical Measures for Protecting Sensitive Information -- 6.1 Installing secure Windows 91 -- 6.2 Recommended best practices 91 -- 6.3 Additional privacy threats and countermeasures 106 -- 6.4 Protecting sensitive data on hard disks 111 -- 7 Basic Protection from Computer Data Theft Online -- 7.1 Protection from which of many online threats? 117 -- 7.2 Installation of Windows for secure online operation 117 -- 7.3 Online security threats and issues 118 -- 7.4 Software to enhance online security 122.
7.5 Basic do's and don'ts 124 -- 8 Practical Measures for Online Computer Activities -- 8.1 Netscape Navigator/Communicator 128 -- 8.2 Microsoft Internet Explorer 133 -- 8.3 Desirable e-mail software configuration and modifications 138 -- 8.4 Secure e-mail conduct online 141 -- 8.5 E-mail forensics and traces: the anonymity that isn™t 149 -- 9 Advanced Protection from Computer Data Theft Online -- 9.1 Virus/Trojan/worm protection 159 -- 9.2 Protection from keyloggers 160 -- 9.3 Protection from commercial adware/spyware 161 -- 9.4 Protection from Web bugs: an insidious and far-reaching threat 163 -- 9.5 Using encrypted connections for content protection 164 -- 9.6 Using proxy servers for anonymity 167 -- 9.7 Using encrypted connections to ISPs for content protection 169 -- 9.8 SSH 171 -- 9.9 The failed promise of peer-to-peer clouds 172 -- 9.10 Caller ID traps to avoid 173 -- 9.11 Traps when connecting online from a cellular phone 174 -- 9.12 Traps when using FTP 174 -- 9.13 Using instant messaging schemes 175 -- 9.14 Pitfalls of online banking 175 -- 9.15 Secure Usenet usage 176 -- 9.16 Ports to protect from 181 -- 9.17 Sniffers 184 -- 9.18 Firewalls 185 -- 9.19 Software that calls home 188 -- 10 Encryption -- 10.1 Introduction 191 -- 10.2 Availability and use of encryption 193 -- 10.3 Attempts to control against encryption 201 -- 10.4 Legal issues 202 -- 10.5 Societal issues 208 -- 10.6 Technical issues 209 -- 10.7 Countermeasures 210 -- 10.8 State support for encryption 211 -- 10.9 The future of encryption 212 -- 10.10 Quantum cryptography 213 -- 10.11 DNA-based encryption 215 -- 10.12 Comments 215 -- 11 Practical Encryption -- 11.1 Introduction 219 -- 11.2 Entire-disk encryption 220 -- 11.3 Encrypting for e-mail: PGP 221 -- 11.4 Encrypting one's own files: encrypted disk partitions 239 -- 11.5 Steganography 243 -- 11.6 Password cracking 249.
11.7 File integrity authenticity: digital digests 252 -- 11.8 Emergencies 253 -- 12 Link Encryption: VPNs -- 12.1 Split tunneling 261 -- 12.2 IPsec 262 -- 12.3 Summary 263 -- 13 Security of Wireless Connectivity: Wi-Fi and Bluetooth -- 13.1 Background 265 -- 13.2 The 802.11 technologies 266 -- 13.3 Bluetooth wireless link security issues 274 -- 14 Other Computer-Related Threats to Privacy -- 14.1 Commercial GPS devices 279 -- 14.2 RF ID devices 281 -- 14.3 Modern vehicles' black boxes 283 -- 14.4 Cell phones 285 -- 14.5 Prepaid calling cards 286 -- 14.6 Credit cards 287 -- 14.7 Intelligent mail 288 -- 14.8 Fax machines and telephone answering machines 288 -- 14.9 Office and home copiers 289 -- 14.10 Frequent-anything clubs 289 -- 14.11 Consumer electronics 290 -- 15 Biometrics: Privacy Versus Nonrepudiation -- 15.1 Are they effective? It depends 291 -- 15.2 Biometrics can be easily spoofed 293 -- 15.3 Identification is not synonymous with security 298 -- 15.4 Societal issues 299 -- 16 Legal Issues -- 16.1 Software agreements that shift the legal liability to the user 301 -- 16.2 Cyber-SLAPP suits 303 -- 16.3 E-mail 303 -- 16.4 Copyright 305 -- 16.5 Can one be forced to reveal a decryption key? 309 -- 16.6 Why is electronic evidence better than paper evidence? 312 -- 16.7 Civil legal discovery issues 315 -- 16.8 International policy on computer-related crime 318 -- 16.9 What is computer crime? 319 -- 16.10 What can a business do to protect itself? 320 -- 16.11 Criminal evidence collection issues 320 -- 16.12 Federal guidelines for searching and seizing computers 321 -- 16.13 Destruction of electronic evidence 326 -- 16.14 U.S.ŒEuropean data-privacy disputes 327 -- 16.15 New international computer crime treaty 327 -- 16.16 The postŒSeptember 11 reality 328 -- 16.17 The sky is the limit-or is it the courts? 331 -- About the Author -- Index.
Summary: This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell's equations. There has been considerable advancement in FDTD computational technology over the past few years, and this new edition brings you the very latest details with four new invited chapters on advanced techniques for PSTD, unconditional stability, provably stable FDTD-FETD hybrids, and hardware acceleration. Moreover, you find many completely new sections throughout the book, including major updates on convolutional PML ABCs; dispersive, nonlinear, classical-gain, and quantum-gain materials; and micro-, nano-, and bio- photonics.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Contents -- Table of Contents -- Introduction -- 1 Computer Forensics -- 1.1 What is Computer Forensics -- 1.2 Why is computer forensics of vital interest to you? 1 -- 1.3 If you have done nothing illegal, you have nothing to fear: not true anywhere! 6 -- 1.4 Computer forensics 8 -- 2 Locating Your Sensitive Data in Your Computer -- 2.1 Deleting does not deleteŠwhat does? 23 -- 2.2 Where is the sensitive data hiding? 32 -- 2.3 The swap file as a source of forensic data 36 -- 2.4 The Registry as a source of forensic data 39 -- 3 Specialized Forensics Applications -- 3.1 Digital watermarking 45 -- 3.2 The British RIP Act and the US Carnivore (DCS1000) 49 -- 4 How Can Sensitive Data Be Stolen From One's Computer? -- 4.1 Physical possession of one™s computer 53 -- 4.2 Temporary physical access to one™s computer 53 -- 4.3 Commercial hardware keystroke loggers 54 -- 4.4 Commercial software keystroke loggers 57 -- 4.5 Going online 58 -- 4.6 Spyware in your computer 60 -- 4.7 van Eck radiation using commercially available systems 64 -- 4.8 Being on a network, cable modem, or xDSL modem 69 -- 4.9 Other means 70 -- 4.10 Insertion of incriminating data in your computer by others 70 -- 4.11 Security protection steps that don™t work well enough 71 -- 5 Why Computer Privacy and Anonymity? -- 5.1 Anonymity 79 -- 5.2 Privacy 82 -- 6 Practical Measures for Protecting Sensitive Information -- 6.1 Installing secure Windows 91 -- 6.2 Recommended best practices 91 -- 6.3 Additional privacy threats and countermeasures 106 -- 6.4 Protecting sensitive data on hard disks 111 -- 7 Basic Protection from Computer Data Theft Online -- 7.1 Protection from which of many online threats? 117 -- 7.2 Installation of Windows for secure online operation 117 -- 7.3 Online security threats and issues 118 -- 7.4 Software to enhance online security 122.

7.5 Basic do's and don'ts 124 -- 8 Practical Measures for Online Computer Activities -- 8.1 Netscape Navigator/Communicator 128 -- 8.2 Microsoft Internet Explorer 133 -- 8.3 Desirable e-mail software configuration and modifications 138 -- 8.4 Secure e-mail conduct online 141 -- 8.5 E-mail forensics and traces: the anonymity that isn™t 149 -- 9 Advanced Protection from Computer Data Theft Online -- 9.1 Virus/Trojan/worm protection 159 -- 9.2 Protection from keyloggers 160 -- 9.3 Protection from commercial adware/spyware 161 -- 9.4 Protection from Web bugs: an insidious and far-reaching threat 163 -- 9.5 Using encrypted connections for content protection 164 -- 9.6 Using proxy servers for anonymity 167 -- 9.7 Using encrypted connections to ISPs for content protection 169 -- 9.8 SSH 171 -- 9.9 The failed promise of peer-to-peer clouds 172 -- 9.10 Caller ID traps to avoid 173 -- 9.11 Traps when connecting online from a cellular phone 174 -- 9.12 Traps when using FTP 174 -- 9.13 Using instant messaging schemes 175 -- 9.14 Pitfalls of online banking 175 -- 9.15 Secure Usenet usage 176 -- 9.16 Ports to protect from 181 -- 9.17 Sniffers 184 -- 9.18 Firewalls 185 -- 9.19 Software that calls home 188 -- 10 Encryption -- 10.1 Introduction 191 -- 10.2 Availability and use of encryption 193 -- 10.3 Attempts to control against encryption 201 -- 10.4 Legal issues 202 -- 10.5 Societal issues 208 -- 10.6 Technical issues 209 -- 10.7 Countermeasures 210 -- 10.8 State support for encryption 211 -- 10.9 The future of encryption 212 -- 10.10 Quantum cryptography 213 -- 10.11 DNA-based encryption 215 -- 10.12 Comments 215 -- 11 Practical Encryption -- 11.1 Introduction 219 -- 11.2 Entire-disk encryption 220 -- 11.3 Encrypting for e-mail: PGP 221 -- 11.4 Encrypting one's own files: encrypted disk partitions 239 -- 11.5 Steganography 243 -- 11.6 Password cracking 249.

11.7 File integrity authenticity: digital digests 252 -- 11.8 Emergencies 253 -- 12 Link Encryption: VPNs -- 12.1 Split tunneling 261 -- 12.2 IPsec 262 -- 12.3 Summary 263 -- 13 Security of Wireless Connectivity: Wi-Fi and Bluetooth -- 13.1 Background 265 -- 13.2 The 802.11 technologies 266 -- 13.3 Bluetooth wireless link security issues 274 -- 14 Other Computer-Related Threats to Privacy -- 14.1 Commercial GPS devices 279 -- 14.2 RF ID devices 281 -- 14.3 Modern vehicles' black boxes 283 -- 14.4 Cell phones 285 -- 14.5 Prepaid calling cards 286 -- 14.6 Credit cards 287 -- 14.7 Intelligent mail 288 -- 14.8 Fax machines and telephone answering machines 288 -- 14.9 Office and home copiers 289 -- 14.10 Frequent-anything clubs 289 -- 14.11 Consumer electronics 290 -- 15 Biometrics: Privacy Versus Nonrepudiation -- 15.1 Are they effective? It depends 291 -- 15.2 Biometrics can be easily spoofed 293 -- 15.3 Identification is not synonymous with security 298 -- 15.4 Societal issues 299 -- 16 Legal Issues -- 16.1 Software agreements that shift the legal liability to the user 301 -- 16.2 Cyber-SLAPP suits 303 -- 16.3 E-mail 303 -- 16.4 Copyright 305 -- 16.5 Can one be forced to reveal a decryption key? 309 -- 16.6 Why is electronic evidence better than paper evidence? 312 -- 16.7 Civil legal discovery issues 315 -- 16.8 International policy on computer-related crime 318 -- 16.9 What is computer crime? 319 -- 16.10 What can a business do to protect itself? 320 -- 16.11 Criminal evidence collection issues 320 -- 16.12 Federal guidelines for searching and seizing computers 321 -- 16.13 Destruction of electronic evidence 326 -- 16.14 U.S.ŒEuropean data-privacy disputes 327 -- 16.15 New international computer crime treaty 327 -- 16.16 The postŒSeptember 11 reality 328 -- 16.17 The sky is the limit-or is it the courts? 331 -- About the Author -- Index.

This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell's equations. There has been considerable advancement in FDTD computational technology over the past few years, and this new edition brings you the very latest details with four new invited chapters on advanced techniques for PSTD, unconditional stability, provably stable FDTD-FETD hybrids, and hardware acceleration. Moreover, you find many completely new sections throughout the book, including major updates on convolutional PML ABCs; dispersive, nonlinear, classical-gain, and quantum-gain materials; and micro-, nano-, and bio- photonics.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

Powered by Koha