Alternate Data Storage Forensics - 1st Edition - ISBN: 9781597491631, 9780080554754

Alternate Data Storage Forensics

1st Edition

eBook ISBN: 9780080554754
Paperback ISBN: 9781597491631
Imprint: Syngress
Published Date: 17th September 2007
Page Count: 400
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.

Key Features

  • Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense
  • Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else
  • Today the industry has exploded and cyber investigators can be found in almost every field


Private, corporate or government investigator, security engineer

Table of Contents

Chapter 1. Alternate Media Chapter 2. Evidentiary Value Chapter 3. Seizure and Handling Chapter 4. Forensic Acquisition Chapter 5. Data Analysis Chapter 6. Future of ADS


No. of pages:
© Syngress 2007
eBook ISBN:
Paperback ISBN:

Ratings and Reviews