Files
This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such a...
Uloženo v:
| Vydáno v: | Cyber Forensics Ročník 623; s. 43 - 83 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Kapitola |
| Jazyk: | angličtina |
| Vydáno: |
United States
John Wiley & Sons, Incorporated
2012
John Wiley & Sons, Inc |
| Témata: | |
| ISBN: | 9781118273661, 1118273664 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such as the file signature, thus there is necessity of a working knowledge of HEX. It is important to understand that not all binary values are convertible into readable ASCII. ASCII is a code, based on the ordering of the English alphabet¸ and not all data contained within a computer is necessarily text (ASCII) based. There are many programs or software applications which are written in programming code which is not ASCII based. |
|---|---|
| AbstractList | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such as the file signature, thus there is necessity of a working knowledge of HEX. It is important to understand that not all binary values are convertible into readable ASCII. ASCII is a code, based on the ordering of the English alphabet¸ and not all data contained within a computer is necessarily text (ASCII) based. There are many programs or software applications which are written in programming code which is not ASCII based. |
| Author | Marcella, Albert J., Jr Guillossou, Frederic |
| Author_xml | – sequence: 1 fullname: Marcella, Albert J., Jr – sequence: 2 fullname: Guillossou, Frederic |
| BookMark | eNptT21LwzAQjujEOfsD_BGdySXNJR9lOBUGftHPoW0ubFra2lREf72ZFcbAg-O4l-d57rlkZ23XEmPXgi8F53Bj0QghLHCpCljWW3XCsmlmwKAU-vTQo9RanLM5arSoEPCCZTG-8hRpoRHnbLbeNRSv2CyUTaTsry7Yy_ruefWQb57uH1e3m7wHjiH3FEBV3FRVYkRNFrFW3Gub3jGV9Aa8FN6WEExhoPDaS6rRak9JHUnJBRMT72dS_XJUdd1bdIK7vTV3ZM0la_tMmPwfzPHt967_ve99OGj0Q_f-QXGcIDW141A29bbsRxqiMwBcFE6i0yh_AESkXkk |
| ContentType | Book Chapter |
| Copyright | Copyright © 2012 by John Wiley & Sons, Inc. |
| Copyright_xml | – notice: Copyright © 2012 by John Wiley & Sons, Inc. |
| DBID | FFUUA |
| DEWEY | 363.250285 |
| DOI | 10.1002/9781119203452.ch4 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work |
| EISBN | 9781118287316 1118287312 1119203457 9781119203452 |
| Editor | Marcella, Albert J. Guillossou, Frederic |
| Editor_xml | – sequence: 1 givenname: Albert J. surname: Marcella fullname: Marcella, Albert J. – sequence: 2 givenname: Frederic surname: Guillossou fullname: Guillossou, Frederic |
| EndPage | 83 |
| ExternalDocumentID | 10.1002/9781119203452.ch4 EBC822015_37_67 |
| Genre | chapter |
| GroupedDBID | 089 38. 3XM 5VX A4J AABBV AAIVD AALIM AAMRL ABARN ABBFG ABQPQ ABQPW ABYOB ACBYE ACCPI ACGYG ACLGV ACNAM ACNUM ACYTI ADVEM AERYV AHWGJ AJFER AJROY AKQZE ALMA_UNASSIGNED_HOLDINGS AMYDA AWAER AZZ BBABE BPBUR CZZ EEHNK FFUUA GHDSN HF4 HZKEI I4C IVL J-X JFSCD KGVDC LQKAK LWYJN MYL OHILO OODEK OTAXI PQQKQ UZ6 W1A WIIVT WZD WZT YPLAZ YSPEL ZEEST ~H6 |
| ID | FETCH-LOGICAL-p207f-def24b08bb76776e977c40d699208b3d82d31d9a2f85825d6d3ec796de7477e43 |
| ISBN | 9781118273661 1118273664 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000416844200005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Nov 27 04:58:36 EST 2019 Sat Nov 15 22:31:08 EST 2025 Tue Oct 21 01:51:29 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum | HV8073.5.M168 2012 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p207f-def24b08bb76776e977c40d699208b3d82d31d9a2f85825d6d3ec796de7477e43 |
| OCLC | 767974727 |
| PQID | EBC822015_37_67 |
| PageCount | 41 |
| ParticipantIDs | proquest_ebookcentralchapters_822015_37_67 wiley_ebooks_10_1002_9781119203452_ch4_ch4 |
| PublicationCentury | 2000 |
| PublicationDate | 2012 2012-01-02 |
| PublicationDateYYYYMMDD | 2012-01-01 2012-01-02 |
| PublicationDate_xml | – year: 2012 text: 2012 |
| PublicationDecade | 2010 |
| PublicationPlace | United States |
| PublicationPlace_xml | – name: United States – name: Hoboken, NJ, USA |
| PublicationSubtitle | From Data to Digital Evidence |
| PublicationTitle | Cyber Forensics |
| PublicationYear | 2012 |
| Publisher | John Wiley & Sons, Incorporated John Wiley & Sons, Inc |
| Publisher_xml | – name: John Wiley & Sons, Incorporated – name: John Wiley & Sons, Inc |
| SSID | ssj0000661677 ssib025989399 |
| Score | 1.3889935 |
| Snippet | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a... |
| SourceID | wiley proquest |
| SourceType | Enrichment Source Publisher |
| StartPage | 43 |
| SubjectTerms | ASCII binary value Computer security File FINANCE & ACCOUNTING Forensic science hexadecimal programming code |
| Title | Files |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=822015&ppg=67 https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119203452.ch4 |
| Volume | 623 |
| WOSCitedRecordID | wos000416844200005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb5wwELaaTQ9VLn2qebTi0OTQiJa1vdhc89hEkbqq1FTNDdl4UFddsQR2q7S_PmMbCCS95NADFrIGNPagYWY88w0hH4SQk1xwFcJEo4PCFepBW-BDk0jTXHEBkLtmE2I2k1dXydemP2Ht2gmIopA3N0n5X0WNcyhsWzr7CHF3L8UJvEeh44hix_GeRTyMvXqwgT8aqkPbb7Ooe3nsX5SL0PsYqkW1Wh1eOLVw0eXmnq3niwX-MZdrb89akIl51v-ipqhABlECl27RjxL8Iw2n0UENXnJXSeUdy7H1OwSLPVB6qyljXxr8QOt6FFf_WEIjxif0U_aT3_1i2mN133njHsD16dExWilolqRMpLHYZ9PyOrRtwezx-T478SLaIBtoqY7I5tn5ybdZF0ZDi2kcC-F6QDUs8wbJq1tCe5gd0c8PeBw4Fn33xNkXl8_Jlq05CWwxCPL8gjyB4iXZ86XTwQ9Y5KqC4CBoJ5bVr1dk08njNfk-Pb08Pg-bphZhSSORhwZyynUktRbIdwxof2c8MnGCTEnNjKSGjU2iaC4n6L2b2DDIRBIbQMdPAGdvyKhYFvCWBAKoBQDULKOK2_aQXFBDtUokgJKUb5OP7dpSd_Te5PtmfjF12t92JHar95R16uGsaTrYsRR3zF7b5GBAPCT6Oy8dYWnyncewsEue3X26e2S0qtbwjjzNfq_mdfW-kfwtweZOuw |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Cyber+Forensics&rft.au=Marcella%2C+Albert+J.%2C+Jr&rft.au=Guillossou%2C+Frederic&rft.atitle=Files&rft.date=2012-01-01&rft.pub=John+Wiley+%26+Sons%2C+Incorporated&rft.isbn=9781118273661&rft.volume=623&rft_id=info:doi/10.1002%2F9781119203452.ch4&rft.externalDBID=67&rft.externalDocID=EBC822015_37_67 |
| thumbnail_s | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F822015-l.jpg |

