Files

This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such a...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Cyber Forensics Ročník 623; s. 43 - 83
Hlavní autori: Marcella, Albert J., Jr, Guillossou, Frederic
Médium: Kapitola
Jazyk:English
Vydavateľské údaje: United States John Wiley & Sons, Incorporated 2012
John Wiley & Sons, Inc
Predmet:
ISBN:9781118273661, 1118273664
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such as the file signature, thus there is necessity of a working knowledge of HEX. It is important to understand that not all binary values are convertible into readable ASCII. ASCII is a code, based on the ordering of the English alphabet¸ and not all data contained within a computer is necessarily text (ASCII) based. There are many programs or software applications which are written in programming code which is not ASCII based.
AbstractList This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such as the file signature, thus there is necessity of a working knowledge of HEX. It is important to understand that not all binary values are convertible into readable ASCII. ASCII is a code, based on the ordering of the English alphabet¸ and not all data contained within a computer is necessarily text (ASCII) based. There are many programs or software applications which are written in programming code which is not ASCII based.
Author Marcella, Albert J., Jr
Guillossou, Frederic
Author_xml – sequence: 1
  fullname: Marcella, Albert J., Jr
– sequence: 2
  fullname: Guillossou, Frederic
BookMark eNptT21LwzAQjujEOfsD_BGdySXNJR9lOBUGftHPoW0ubFra2lREf72ZFcbAg-O4l-d57rlkZ23XEmPXgi8F53Bj0QghLHCpCljWW3XCsmlmwKAU-vTQo9RanLM5arSoEPCCZTG-8hRpoRHnbLbeNRSv2CyUTaTsry7Yy_ruefWQb57uH1e3m7wHjiH3FEBV3FRVYkRNFrFW3Gub3jGV9Aa8FN6WEExhoPDaS6rRak9JHUnJBRMT72dS_XJUdd1bdIK7vTV3ZM0la_tMmPwfzPHt967_ve99OGj0Q_f-QXGcIDW141A29bbsRxqiMwBcFE6i0yh_AESkXkk
ContentType Book Chapter
Copyright Copyright © 2012 by John Wiley & Sons, Inc.
Copyright_xml – notice: Copyright © 2012 by John Wiley & Sons, Inc.
DBID FFUUA
DEWEY 363.250285
DOI 10.1002/9781119203452.ch4
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Social Welfare & Social Work
EISBN 9781118287316
1118287312
1119203457
9781119203452
Editor Marcella, Albert J.
Guillossou, Frederic
Editor_xml – sequence: 1
  givenname: Albert J.
  surname: Marcella
  fullname: Marcella, Albert J.
– sequence: 2
  givenname: Frederic
  surname: Guillossou
  fullname: Guillossou, Frederic
EndPage 83
ExternalDocumentID 10.1002/9781119203452.ch4
EBC822015_37_67
Genre chapter
GroupedDBID 089
38.
3XM
5VX
A4J
AABBV
AAIVD
AALIM
AAMRL
ABARN
ABBFG
ABQPQ
ABQPW
ABYOB
ACBYE
ACCPI
ACGYG
ACLGV
ACNAM
ACNUM
ACYTI
ADVEM
AERYV
AHWGJ
AJFER
AJROY
AKQZE
ALMA_UNASSIGNED_HOLDINGS
AMYDA
AWAER
AZZ
BBABE
BPBUR
CZZ
EEHNK
FFUUA
GHDSN
HF4
HZKEI
I4C
IVL
J-X
JFSCD
KGVDC
LQKAK
LWYJN
MYL
OHILO
OODEK
OTAXI
PQQKQ
UZ6
W1A
WIIVT
WZD
WZT
YPLAZ
YSPEL
ZEEST
~H6
ID FETCH-LOGICAL-p207f-def24b08bb76776e977c40d699208b3d82d31d9a2f85825d6d3ec796de7477e43
ISBN 9781118273661
1118273664
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000416844200005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Nov 27 04:58:36 EST 2019
Sat Nov 15 22:31:08 EST 2025
Tue Oct 21 01:51:29 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum HV8073.5.M168 2012
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p207f-def24b08bb76776e977c40d699208b3d82d31d9a2f85825d6d3ec796de7477e43
OCLC 767974727
PQID EBC822015_37_67
PageCount 41
ParticipantIDs proquest_ebookcentralchapters_822015_37_67
wiley_ebooks_10_1002_9781119203452_ch4_ch4
PublicationCentury 2000
PublicationDate 2012
2012-01-02
PublicationDateYYYYMMDD 2012-01-01
2012-01-02
PublicationDate_xml – year: 2012
  text: 2012
PublicationDecade 2010
PublicationPlace United States
PublicationPlace_xml – name: United States
– name: Hoboken, NJ, USA
PublicationSubtitle From Data to Digital Evidence
PublicationTitle Cyber Forensics
PublicationYear 2012
Publisher John Wiley & Sons, Incorporated
John Wiley & Sons, Inc
Publisher_xml – name: John Wiley & Sons, Incorporated
– name: John Wiley & Sons, Inc
SSID ssj0000661677
ssib025989399
Score 1.3890442
Snippet This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a...
SourceID wiley
proquest
SourceType Enrichment Source
Publisher
StartPage 43
SubjectTerms ASCII
binary value
Computer security
File
FINANCE & ACCOUNTING
Forensic science
hexadecimal
programming code
Title Files
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=822015&ppg=67
https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119203452.ch4
Volume 623
WOSCitedRecordID wos000416844200005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbaLQfEpRQQhRblgHqgCji248e526WnFVJb0Vvk-AErqnSVLKjw6xnbyW4DFVIPHGJF1sgZexx7PnseCL2tlTYUcHIOm7PNmXE0r0uPc2V8UXhntfJ1TDYh5nN5daU-9TnbuphOQDSNvL1Vy_8qaqgDYQfX2QeIe90oVMA7CB1KEDuUf2jE47PXFGzgZ-3a45Bvs-mCCRDg_VlwIJnqlQ5q5nTxJWQJOR6Sid6dMTNYIEanANGcIscbzHiPmc3YljLhxSLACUF5in_er1kpTNKw-9F719UUpzW1oAimrCTvzVe22UTWpn3_oN5G26BsTtDOx7Pp-Xz46wF_gc7Ug6K0f_KCCxHTOvXssj4415r94X4akw9_fWaEFe4ijqgyXOyiJ8GNJAv-HcD4U7Tlmj10kLyhs8_u2uvWZUfZUHHTfnuGdqIInqPL2enFyVne56nIlwQLn1vnCauxrGsBfHMHKrVh2HIFTMmaWkksLazSxMsSALnlljojFLcOsJxwjL5Ak-amcS9RZijzpZFalkYzTZ3mWhGLsZFOGWXVPno39K2Kt-m9Ca9Jnekq0PdAwauoqLgA4tj7RNlVKUI1qUYjVsGIhWcfHY2Ix0S_FstIuLT-1UNafY0eb2brAZqs2u_uED0yP1aLrn3Tz4Tf_6U6gQ
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Cyber+Forensics%3A+From+Data+to+Digital+Evidence&rft.atitle=Files&rft.date=2012-01-02&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.isbn=9781118273661&rft.spage=43&rft.epage=83&rft_id=info:doi/10.1002%2F9781119203452.ch4&rft.externalDocID=10.1002%2F9781119203452.ch4
thumbnail_s http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F822015-l.jpg