Files
This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such a...
Gespeichert in:
| Veröffentlicht in: | Cyber Forensics Jg. 623; S. 43 - 83 |
|---|---|
| Hauptverfasser: | , |
| Format: | Buchkapitel |
| Sprache: | Englisch |
| Veröffentlicht: |
United States
John Wiley & Sons, Incorporated
2012
John Wiley & Sons, Inc |
| Schlagworte: | |
| ISBN: | 9781118273661, 1118273664 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such as the file signature, thus there is necessity of a working knowledge of HEX. It is important to understand that not all binary values are convertible into readable ASCII. ASCII is a code, based on the ordering of the English alphabet¸ and not all data contained within a computer is necessarily text (ASCII) based. There are many programs or software applications which are written in programming code which is not ASCII based. |
|---|---|
| AbstractList | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a file cannot be viewed in a legible or searchable text format such as ASCII or Unicode, specifically data contain within file headers, such as the file signature, thus there is necessity of a working knowledge of HEX. It is important to understand that not all binary values are convertible into readable ASCII. ASCII is a code, based on the ordering of the English alphabet¸ and not all data contained within a computer is necessarily text (ASCII) based. There are many programs or software applications which are written in programming code which is not ASCII based. |
| Author | Marcella, Albert J., Jr Guillossou, Frederic |
| Author_xml | – sequence: 1 fullname: Marcella, Albert J., Jr – sequence: 2 fullname: Guillossou, Frederic |
| BookMark | eNptT21LwzAQjujEOfsD_BGdySXNJR9lOBUGftHPoW0ubFra2lREf72ZFcbAg-O4l-d57rlkZ23XEmPXgi8F53Bj0QghLHCpCljWW3XCsmlmwKAU-vTQo9RanLM5arSoEPCCZTG-8hRpoRHnbLbeNRSv2CyUTaTsry7Yy_ruefWQb57uH1e3m7wHjiH3FEBV3FRVYkRNFrFW3Gub3jGV9Aa8FN6WEExhoPDaS6rRak9JHUnJBRMT72dS_XJUdd1bdIK7vTV3ZM0la_tMmPwfzPHt967_ve99OGj0Q_f-QXGcIDW141A29bbsRxqiMwBcFE6i0yh_AESkXkk |
| ContentType | Book Chapter |
| Copyright | Copyright © 2012 by John Wiley & Sons, Inc. |
| Copyright_xml | – notice: Copyright © 2012 by John Wiley & Sons, Inc. |
| DBID | FFUUA |
| DEWEY | 363.250285 |
| DOI | 10.1002/9781119203452.ch4 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work |
| EISBN | 9781118287316 1118287312 1119203457 9781119203452 |
| Editor | Marcella, Albert J. Guillossou, Frederic |
| Editor_xml | – sequence: 1 givenname: Albert J. surname: Marcella fullname: Marcella, Albert J. – sequence: 2 givenname: Frederic surname: Guillossou fullname: Guillossou, Frederic |
| EndPage | 83 |
| ExternalDocumentID | 10.1002/9781119203452.ch4 EBC822015_37_67 |
| Genre | chapter |
| GroupedDBID | 089 38. 3XM 5VX A4J AABBV AAIVD AALIM AAMRL ABARN ABBFG ABQPQ ABQPW ABYOB ACBYE ACCPI ACGYG ACLGV ACNAM ACNUM ACYTI ADVEM AERYV AHWGJ AJFER AJROY AKQZE ALMA_UNASSIGNED_HOLDINGS AMYDA AWAER AZZ BBABE BPBUR CZZ EEHNK FFUUA GHDSN HF4 HZKEI I4C IVL J-X JFSCD KGVDC LQKAK LWYJN MYL OHILO OODEK OTAXI PQQKQ UZ6 W1A WIIVT WZD WZT YPLAZ YSPEL ZEEST ~H6 |
| ID | FETCH-LOGICAL-p207f-def24b08bb76776e977c40d699208b3d82d31d9a2f85825d6d3ec796de7477e43 |
| ISBN | 9781118273661 1118273664 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000416844200005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Nov 27 04:58:36 EST 2019 Sat Nov 15 22:31:08 EST 2025 Tue Oct 21 01:51:29 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum | HV8073.5.M168 2012 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p207f-def24b08bb76776e977c40d699208b3d82d31d9a2f85825d6d3ec796de7477e43 |
| OCLC | 767974727 |
| PQID | EBC822015_37_67 |
| PageCount | 41 |
| ParticipantIDs | proquest_ebookcentralchapters_822015_37_67 wiley_ebooks_10_1002_9781119203452_ch4_ch4 |
| PublicationCentury | 2000 |
| PublicationDate | 2012 2012-01-02 |
| PublicationDateYYYYMMDD | 2012-01-01 2012-01-02 |
| PublicationDate_xml | – year: 2012 text: 2012 |
| PublicationDecade | 2010 |
| PublicationPlace | United States |
| PublicationPlace_xml | – name: United States – name: Hoboken, NJ, USA |
| PublicationSubtitle | From Data to Digital Evidence |
| PublicationTitle | Cyber Forensics |
| PublicationYear | 2012 |
| Publisher | John Wiley & Sons, Incorporated John Wiley & Sons, Inc |
| Publisher_xml | – name: John Wiley & Sons, Incorporated – name: John Wiley & Sons, Inc |
| SSID | ssj0000661677 ssib025989399 |
| Score | 1.3890442 |
| Snippet | This chapter examines hexadecimal (HEX) and discusses the relevance of HEX when examining file signature metadata. It is noted that some data contains within a... |
| SourceID | wiley proquest |
| SourceType | Enrichment Source Publisher |
| StartPage | 43 |
| SubjectTerms | ASCII binary value Computer security File FINANCE & ACCOUNTING Forensic science hexadecimal programming code |
| Title | Files |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=822015&ppg=67 https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119203452.ch4 |
| Volume | 623 |
| WOSCitedRecordID | wos000416844200005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbolgPqhacoLSgH2gNVIGs7tnOl7baqxAqJInqLHD_EilU2JLuo8OsZ20matFx64BArsibR2BNNZsYz3yD0VhYCc8aKWGRGxVQzGUuhVCwYTaXE0iqlfbMJPp-Lq6vsc9ufsPHtBHhZiuvrrPqvooY5ELYrnb2HuPuXwgTcg9BhBLHDeMsiHsdeA9jA78LUR67fZtkM8tg_SR-hDzFUh2q1PrrwauGiz8092yyWS_hjrjbBnnUgEws1_KJmoEBGUQKfbjGMEvwjDafVQS1ecl9JFRzLqfM7OGEBKL3TlCyUBt_RugHFNTyW4YTQFL9X3-nNL6Y7Vg-dN24BXJ9-PAYrBcySnPCc8QMyq37Gri2YOz4_ICdBRFtoCyzVCdo-Oz_5Mu_DaGAxTRnnvgdUyzJtkbz6JXSH2Qn-cIfHkWMxdE-8fXH5GO24mpPIFYMAz0_QA1M-RfuhdDr6ZpZW1iY6jLqJVf3jGdr28niOvs5OL4_P47apRVzhhNtYG4tpkYii4MA3M2B_K5polgFToiBaYE2mOpPYihS8d800MYpnTBtw_Lih5AWalKvSvESR4alSTEpqZQFueiqpSoSyxlIphLZmF73r1pb7o_c231eFxTT5cNuB2K8-UDZ5gLPG-WjHctgxd-2iwxHxmOjPovKElbav7sPCHnp08-nuo8m63pjX6KH6tV409ZtW8n8Br35RUA |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Cyber+Forensics&rft.au=Marcella%2C+Albert+J.%2C+Jr&rft.au=Guillossou%2C+Frederic&rft.atitle=Files&rft.date=2012-01-01&rft.pub=John+Wiley+%26+Sons%2C+Incorporated&rft.isbn=9781118273661&rft.volume=623&rft_id=info:doi/10.1002%2F9781119203452.ch4&rft.externalDBID=67&rft.externalDocID=EBC822015_37_67 |
| thumbnail_s | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F822015-l.jpg |

