Files
This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such a...
Uložené v:
| Vydané v: | Cyber Forensics Ročník 623; s. 43 - 83 |
|---|---|
| Hlavní autori: | , |
| Médium: | Kapitola |
| Jazyk: | English |
| Vydavateľské údaje: |
United States
John Wiley & Sons, Incorporated
2012
John Wiley & Sons, Inc |
| Predmet: | |
| ISBN: | 9781118273661, 1118273664 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such as the file signature, thus there is necessity of a working knowledge of HEX. It is important to understand that not all binary values are convertible into readable ASCII. ASCII is a code, based on the ordering of the English alphabet¸ and not all data contained within a computer is necessarily text (ASCII) based. There are many programs or software applications which are written in programming code which is not ASCII based. |
|---|---|
| AbstractList | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such as the file signature, thus there is necessity of a working knowledge of HEX. It is important to understand that not all binary values are convertible into readable ASCII. ASCII is a code, based on the ordering of the English alphabet¸ and not all data contained within a computer is necessarily text (ASCII) based. There are many programs or software applications which are written in programming code which is not ASCII based. |
| Author | Marcella, Albert J., Jr Guillossou, Frederic |
| Author_xml | – sequence: 1 fullname: Marcella, Albert J., Jr – sequence: 2 fullname: Guillossou, Frederic |
| BookMark | eNptT21LwzAQjujEOfsD_BGdySXNJR9lOBUGftHPoW0ubFra2lREf72ZFcbAg-O4l-d57rlkZ23XEmPXgi8F53Bj0QghLHCpCljWW3XCsmlmwKAU-vTQo9RanLM5arSoEPCCZTG-8hRpoRHnbLbeNRSv2CyUTaTsry7Yy_ruefWQb57uH1e3m7wHjiH3FEBV3FRVYkRNFrFW3Gub3jGV9Aa8FN6WEExhoPDaS6rRak9JHUnJBRMT72dS_XJUdd1bdIK7vTV3ZM0la_tMmPwfzPHt967_ve99OGj0Q_f-QXGcIDW141A29bbsRxqiMwBcFE6i0yh_AESkXkk |
| ContentType | Book Chapter |
| Copyright | Copyright © 2012 by John Wiley & Sons, Inc. |
| Copyright_xml | – notice: Copyright © 2012 by John Wiley & Sons, Inc. |
| DBID | FFUUA |
| DEWEY | 363.250285 |
| DOI | 10.1002/9781119203452.ch4 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work |
| EISBN | 9781118287316 1118287312 1119203457 9781119203452 |
| Editor | Marcella, Albert J. Guillossou, Frederic |
| Editor_xml | – sequence: 1 givenname: Albert J. surname: Marcella fullname: Marcella, Albert J. – sequence: 2 givenname: Frederic surname: Guillossou fullname: Guillossou, Frederic |
| EndPage | 83 |
| ExternalDocumentID | 10.1002/9781119203452.ch4 EBC822015_37_67 |
| Genre | chapter |
| GroupedDBID | 089 38. 3XM 5VX A4J AABBV AAIVD AALIM AAMRL ABARN ABBFG ABQPQ ABQPW ABYOB ACBYE ACCPI ACGYG ACLGV ACNAM ACNUM ACYTI ADVEM AERYV AHWGJ AJFER AJROY AKQZE ALMA_UNASSIGNED_HOLDINGS AMYDA AWAER AZZ BBABE BPBUR CZZ EEHNK FFUUA GHDSN HF4 HZKEI I4C IVL J-X JFSCD KGVDC LQKAK LWYJN MYL OHILO OODEK OTAXI PQQKQ UZ6 W1A WIIVT WZD WZT YPLAZ YSPEL ZEEST ~H6 |
| ID | FETCH-LOGICAL-p207f-def24b08bb76776e977c40d699208b3d82d31d9a2f85825d6d3ec796de7477e43 |
| ISBN | 9781118273661 1118273664 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000416844200005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Nov 27 04:58:36 EST 2019 Sat Nov 15 22:31:08 EST 2025 Tue Oct 21 01:51:29 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum | HV8073.5.M168 2012 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p207f-def24b08bb76776e977c40d699208b3d82d31d9a2f85825d6d3ec796de7477e43 |
| OCLC | 767974727 |
| PQID | EBC822015_37_67 |
| PageCount | 41 |
| ParticipantIDs | proquest_ebookcentralchapters_822015_37_67 wiley_ebooks_10_1002_9781119203452_ch4_ch4 |
| PublicationCentury | 2000 |
| PublicationDate | 2012 2012-01-02 |
| PublicationDateYYYYMMDD | 2012-01-01 2012-01-02 |
| PublicationDate_xml | – year: 2012 text: 2012 |
| PublicationDecade | 2010 |
| PublicationPlace | United States |
| PublicationPlace_xml | – name: United States – name: Hoboken, NJ, USA |
| PublicationSubtitle | From Data to Digital Evidence |
| PublicationTitle | Cyber Forensics |
| PublicationYear | 2012 |
| Publisher | John Wiley & Sons, Incorporated John Wiley & Sons, Inc |
| Publisher_xml | – name: John Wiley & Sons, Incorporated – name: John Wiley & Sons, Inc |
| SSID | ssj0000661677 ssib025989399 |
| Score | 1.3890442 |
| Snippet | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a... |
| SourceID | wiley proquest |
| SourceType | Enrichment Source Publisher |
| StartPage | 43 |
| SubjectTerms | ASCII binary value Computer security File FINANCE & ACCOUNTING Forensic science hexadecimal programming code |
| Title | Files |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=822015&ppg=67 https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119203452.ch4 |
| Volume | 623 |
| WOSCitedRecordID | wos000416844200005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbaLQfEpRQQhRblgHqgCji248e526WnFVJb0Vvk-AErqnSVLKjw6xnbyW4DFVIPHGJF1sgZexx7PnseCL2tlTYUcHIOm7PNmXE0r0uPc2V8UXhntfJ1TDYh5nN5daU-9TnbuphOQDSNvL1Vy_8qaqgDYQfX2QeIe90oVMA7CB1KEDuUf2jE47PXFGzgZ-3a45Bvs-mCCRDg_VlwIJnqlQ5q5nTxJWQJOR6Sid6dMTNYIEanANGcIscbzHiPmc3YljLhxSLACUF5in_er1kpTNKw-9F719UUpzW1oAimrCTvzVe22UTWpn3_oN5G26BsTtDOx7Pp-Xz46wF_gc7Ug6K0f_KCCxHTOvXssj4415r94X4akw9_fWaEFe4ijqgyXOyiJ8GNJAv-HcD4U7Tlmj10kLyhs8_u2uvWZUfZUHHTfnuGdqIInqPL2enFyVne56nIlwQLn1vnCauxrGsBfHMHKrVh2HIFTMmaWkksLazSxMsSALnlljojFLcOsJxwjL5Ak-amcS9RZijzpZFalkYzTZ3mWhGLsZFOGWXVPno39K2Kt-m9Ca9Jnekq0PdAwauoqLgA4tj7RNlVKUI1qUYjVsGIhWcfHY2Ix0S_FstIuLT-1UNafY0eb2brAZqs2u_uED0yP1aLrn3Tz4Tf_6U6gQ |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Cyber+Forensics%3A+From+Data+to+Digital+Evidence&rft.atitle=Files&rft.date=2012-01-02&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.isbn=9781118273661&rft.spage=43&rft.epage=83&rft_id=info:doi/10.1002%2F9781119203452.ch4&rft.externalDocID=10.1002%2F9781119203452.ch4 |
| thumbnail_s | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F822015-l.jpg |

