Index
Note: Page numbers followed by t indicates tables; f indicates figures; b indicates boxes.
A
ACK bit
446–447
Address Book, Macintosh analysis
379, 380f
Alibi, digital forensic analysis assessment
28–29
AMX Corp
1–2
Apple
seeiPod
see alsoMacintosh
Attribution, digital forensic analysis applications
27–28
B
Back-door, embedded system access
399–400, 400b
Backlog, management with limited resources
33b
Backup tape, data preservation and collection
105–106, 106b
Ball Grid Array (BGA) chip, removal and analysis
410–411, 411f, 412f
Bind Torture Kill (BTK) case
27–28
Bitlocker, analysis in Windows
288–290
Boot loader
data acquisition
407–408
features
389
Boundary-scan/JTAG
data acquisition
408–410, 409f
principles
389
Broccoli v. Echostar Communications ...

Get Handbook of Digital Forensics and Investigation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.