Advances in Digital Forensics IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13–16, 2005 /
ADVANCES IN DIGITAL FORENSICS Edited by: Mark Pollitt and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of di...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2005.
|
Σειρά: | IFIP — The International Federation for Information Processing,
194 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Themes and Issues
- Dealing with Terabyte Data Sets in Digital Investigations
- Forensics and Privacy-Enhancing Technologies
- A Network-Based Architecture for Storing Digital Evidence
- Digital Forensics: Meeting the Challenges of Scientific Evidence
- Non-Technical Manipulation of Digital Data
- Investigative Techniques
- Detecting Social Engineering
- A Framework for Email Investigations
- The Mitnick Case: How Bayes Could Have Helped
- Applying Forensic Principles to Computer-Based Assessment
- Exploring Forensic Data with Self-Organizing Maps
- Network Forensics
- Integrating Digital Forensics in Network Infrastructures
- Using Peer-to-Peer Technology for Network Forensics
- Forensic Profiling System
- Global Internet Routing Forensics
- Using Signaling Information in Telecom Network Forensics
- Portable Electronic Device Forensics
- Forensic Analysis of Mobile Phone Internal Memory
- Imaging and Analysis of GSM SIM Cards
- Extracting Concealed Data from BIOS Chips
- Linux and File System Forensics
- Recovering Digital Evidence from Linux Systems
- Detecting Hidden Data in Ext2/Ext3 File Systems
- Applications and Techniques
- Forensic Analysis of Digital Image Tampering
- Content-Based Image Retrieval for Digital Forensics
- Making Decisions about Legal Responses to Cyber Attacks
- Applying Filter Clusters to Reduce Search State Space
- In-Kernel Cryptographic Executable Verification.