Digital Evidence and Computer Crime Forensic Science, Computers and The Internet 2nd Ed [Electronic resources]

Eoghan Casey

نسخه متنی -صفحه : 280/ 260
نمايش فراداده

Index

H

Hackers, 26, 44, 60, 453–5

Handheld devices, 339

collection and examination of, 344–52

data storage and manipulation, 339–41

forensic analysis of, 337

memory, 339

overview of, 338–44

Handle, 531

Harassment see stalking

Hard drive removal, 196

Hardware, 34, 664

as contraband or fruits of crime, 35

duplication devices, 227

as evidence, 36–7

as an instrumentality, 36

system damage, 291

Harvesting of potential digital evidence, 109

Hash Values, 633

Hashkeeper, 635

Hashl, 297

HAVAL, 219

Headers, 110, 176, 244, 267

database, 340

e-mail, 393, 402, 456, 483

record entry, 340

TCP/IP, 423, 473

Usenet, 486

Heaplist, 341–3

Heaps, 339–40

Hearsay and digital evidence, 179–83

exceptions, 181

Henriques, Bart, 576

Hexadecimal editor, 270

Hexadecimal representation of data, 198

Hexdumpl, 297–8

HFS see Macintosh

Hibernation files, 238

Hidden data recovery, 238, 346

High risk victim, 664

Hillyard, Richard, 603

History.dat, 316

Hives see Registry files

Hollinger's crime, deviance and the computer, 26

Homicide, 11, 16, 31, 136, 140, 159, 162, 221, 378, 619

Hosts, 319, 361–3, 365–6, 664

communication, 369–73

Hotline Client, 379

Hotline Server, 379

Hotmail, 97, 410, 437, 507

HotSync, 347–9, 353

HP-UX, 289, 293

Htdig, 491

Httrack, 491

Hubs, 362, 459

Hushmail, 409, 498

Hyperterminal, 396, 431

Hypertext Transfer Protocol (HTTP), 363

Hypothesis formation, 103