Index_B


B

Babbage, 191

Back Orifice, 277, 449

Backup copies, 203, 292

10Base5, 420–1

10/100BaseT, 421

100BaseT, 421

Balanced tree (B-tree), 260, 323–4

Banks, 37

unauthorized access to records from, 30

Bar code scanning, 338

Basic Input and Output System see BIOS

Basic Security Module (BSM), 311

Behavioral evidence, 662

analysis, 414–15, 662

crime scene characteristics

Behavioral imprints, 115

Behavior-motivational typology, 662

classification system, 159

Behaviors, types of, 159

Bell Atlantic Laboratories, 194

Benedict, L., 134

Bensusan Restaurant Corporation v. King, 41–2

Beowulf cluster, 310

Berkeley Database (DB), 233, 316, 331

Best Evidence Rule, 178

Bigendian systems, 198

BIOS, 195–6

Bitstream copy:

of disk, 294

of digital evidence, 395

Black Widow, 491

Blackberry devices, 355

Block groups, 292

in UNIX file systems, use of, 307

Blowfish, 207, 497

encryption, 525

Blue Magnet, 154

Blue Note jazz club in New York City, 41

Bluetooth, 338, 364

Bondage and sadomasochism (BDSM) online groups, 587

Boole, G., 191

Boolean logic, 191

Boot disks, 227, 256, 290

Boot sector, 203

Bootstrap Protocol (BOOTP), 457, 618

Bots, 497

see also Internet Relay Chats

"bouncer" (BNC), 498

see also Internet Relay Chats

Brandies, L., 51

Briefcase feature on Yahoo!, 285

BrightStor ARCserve Backup, 393

Broad targeting, 542, 662

Broad versus narrow searches, issue of, 214

BSM audit records, 364

B-tree see Balanced tree

Buffer overflows, 524, 662

Bugtraq, 404

Bulletin Board System (BBS), 44, 379, 662

Byte Back, 261




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net