- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
New Trade Paper
Currently out of stock.
available for shipping or prepaid pickup only
Xbox 360 Forensics: A Digital Forensics Guide to Examining Artifactsby Steven Bolt
Synopses & Reviews
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the likelihood that a criminal investigator encounters an XBOX 360 is a certainty. The digital forensics community has already begun to receive game consoles for examination, but there is no map for them to follow as there may be with other digital media. XBOX 360 Forensics provides that map and present the information for the examiners in an easy to read, easy to read format.
A complete investigation guide for the XBOX game console.
Because the XBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evidence to assist in your next criminal investigation. The digital forensics community has already begun to receive game consoles for examination, but there is currently no map for you to follow as there may be with other digital media. XBOX 360 Forensics provides that map and presents the information in an easy to read, easy to reference format, from the author of the first whitepaper on XBOX investigations. As cyber crime continues to plague society the need for the cyber crime investigative community to have resources to call upon to assist them in their examinations is imperative.
About the Author
Steven Bolt is a Computer Forensics Leader, Instructor and course developer at the Defence Cyber Investigations Training Academy. In this position he provides instruction and guidance to support the criminal investigators of the DoD and other federal investigators. He has spoken at many national and international conferences on topics ranging from Onion routing to investigation of SOHO networks. These conferences include the Department of Defence Cyber Crime Conference, the High Technology Crime Investigators association national and international conferences, and the Internet Crimes Against Children national conference.
is a Computer Forensics Leader, and Instructor at the Defence Cyber Investigations Training Academy. He provides instruction and guidance to support the criminal investigators of the DoD and other federal investigators.
Table of Contents
Chapter 1. The Xbox 360: Why We Need to be concerned Chapter 2. Xbox 360 Hardware Chapter 3. XBOX LIVE Chapter 4. Configuration of the Console Chapter 5. Initial Forensic Acquisition and Examination Chapter 6. Xbox 360 - Specific File Types Chapter 7. Xbox 360 Hard Drive Chapter 8. Post-System Update Drive Artifacts Chapter 9. XBOX Live Redemption Code and Facebook Chapter 10. Game Play Chapter 11. Additional Files and Research Techniques Appendix A. Tools Used in this Research Appendix B. List of Products Used to Construct the Off the Shelf Capture Box Appendix C. Removal of the Hard Drive from the New XBOX 360 Slim and Artifacts Pertaining to Data Migration from One Drive to Another Appendix D. Other Publications
What Our Readers Are Saying