News Archives

Digital Forensics Trial Graphics
March 9, 2017 · Publications
Summary: Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technology that help anyone understand the complex concepts behind the science. Users will find invaluable information on theory and best practices along
Mobile Device Forensics: Threats, Challenges, and Future Trends
December 1, 2016 · Publications
Summary: Recent implementations of cutting-edge features in smart mobile devices have consumers turning to such technology in increasing numbers as their primary source of communication and information sue to their high degree of portability, privacy, and functionality. As such, emerging technologies have driven substantial progress and unparalleled growth in the field of mobile device forensics,
A Survey of Mobile Crowdsensing Techniques: A Critical Component for the Internet of Things
September 15, 2016 · Publications
Summary: Mobile crowdsensing serves as a critical building block for the emerging Internet of Things (IoT) applications. However, the sensing devices continuously generate a large amount of data, which consumes much resources (e.g., bandwidth, energy and storage), and may sacrifice the quality-of-service (QoS) of applications. Prior work has demonstrated that there is significant redundancy in
The Basics of Cyber Safety
August 20, 2016 · Publications
Summary: The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book’s author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to
Scheduling internet of things applications in cloud computing
June 9, 2016 · Publications
Summary: Internet of Things (IoT) is one of the greatest technology revolutions in the history. Due to IoT potential, daily objects will be consciously worked in harmony with optimized performances. However, today, technology is not ready to fully bring its power to our daily life because of huge data analysis requirements in instant time. On
Perceptions of Data Privacy during Digital Forensic Investigations in India
January 6, 2016 · Publications
Summary: Digital forensic investigation requires the investigator to examine the forensic image of the seized storage media or device. The investigator gets full access to all the data contained in the forensic image including the suspect’s private or sensitive data that may be entirely unrelated to the given case. The unrestricted access to the forensic
Forensic Analysis of Mobile Ads to Identify Users
January 6, 2016 · Publications
Summary: The search providers track the user’s browsing behavior to construct his or her activity profile. The tracking helps the search engines to fine-tune the results and presenting user-specific advertising. When a search input matches with some commercial product or service offering, ads based on the previously saved interests, likes, and dislikes are displayed. The
Digital Forensics With the Accessdata Forensic Toolkit (FTK)
January 5, 2016 · Publications
Summary: Learn how to use AccessData’s Forensic Toolkit (FTK) while mastering the fundamentals of digital forensics: Digital Forensics with the AccessData Forensic Toolkit (FTK) provides a comprehensive review of essential digital forensics concepts and builds on this information to teach you how to conduct digital investigations with AccessData’s FTK―the industry-standard, court-accepted digital investigations platform. Part I
Digital Forensics: Threatscape and Best Practices
December 28, 2015 · Publications
Summary: Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can
Google Hacking for Penetration Testers (3rd Edition)
December 16, 2015 · Publications
Summary: Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security