- Practical Mobile Forensics(Third Edition)
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 81字
- 2021-06-30 19:32:59
Using hash values
All image files should be hashed after acquisition to ensure that data remains unchanged. If filesystem extraction is supported, the examiner extracts the filesystem and then computes hashes for the extracted files. Later, any individually extracted file hash is calculated and checked against the original value to verify the integrity of it. Any discrepancy in a hash value must be explainable (for example, the device was powered on and then acquired again, thus the hash values are different).
推薦閱讀
- 網(wǎng)絡(luò)學(xué)術(shù)信息老化及應(yīng)對(duì)管理
- Hands-On Concurrency with Rust
- 現(xiàn)代圖書(shū)館全面質(zhì)量管理與創(chuàng)新服務(wù)研究
- 李一氓文存(第二卷):存在集三編下冊(cè)
- Practical Industrial Internet of Things Security
- 云環(huán)境下我國(guó)綜合數(shù)字檔案館建設(shè)模式研究
- 法學(xué)研究與文獻(xiàn)檢索
- 西夏檔案及其管理制度研究
- 圖書(shū)館學(xué)基礎(chǔ)簡(jiǎn)明教程
- 茶與咖啡:張信剛文化與經(jīng)濟(jì)講座
- 圖書(shū)館學(xué)散論:科學(xué)網(wǎng)圖謀博客精粹
- 中國(guó)圖書(shū)館轉(zhuǎn)型風(fēng)險(xiǎn)研究
- 梁思成林徽因影像與手稿珍集
- 二十世紀(jì)圖書(shū)館與文化名人
- 探索集