|
|
|
|
LEADER |
05684nam a22005775i 4500 |
001 |
978-3-642-33962-2 |
003 |
DE-He213 |
005 |
20151126141251.0 |
007 |
cr nn 008mamaa |
008 |
121208s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642339622
|9 978-3-642-33962-2
|
024 |
7 |
|
|a 10.1007/978-3-642-33962-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Advances in Digital Forensics VIII
|h [electronic resource] :
|b 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers /
|c edited by Gilbert Peterson, Sujeet Shenoi.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XVIII, 334 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a IFIP Advances in Information and Communication Technology,
|x 1868-4238 ;
|v 383
|
505 |
0 |
|
|a On the Creation of Reliable Digital Evidence -- Managing Terabyte-Scale Investigations with Similarity Digests -- Visualizing Information in Digital Forensics -- XML Conversion of the Windows Registry for Forensic Processing and Distribution -- Context-Based File Block Classification -- A New Approach for Creating Forensic Hashsets -- Reasoning about Evidence Using Bayesian Networks -- Data Visualization for Social Network Forensics -- Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones -- Comparing Sources of Location Data from Android Smartphone -- An Open Framework for Smartphone Evidence Acquisition -- Finding File Fragments in the Cloud -- Isolating Instances in Cloud Forensics -- Key Terms for Service Level Agreements to Support Cloud Forensics -- Evidence Collection in Peer-to-Peer Network Investigations -- Validation of Rules Used in Foxy Peer-to-Peer Network Investigations -- A Log File Digital Forensic Model -- Implementing Forensic Readiness Using Performance Monitoring Tools -- Reconstruction in Database Forensics -- Data Hiding Techniques for Database Environments -- Forensic Tracking and Mobility Prediction in Vehicular Networks -- Using Internal Depth to Aid Stereoscopic Image Splicing Detection. .
|
520 |
|
|
|a Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VIII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, mobile phone forensics, cloud forensics, network forensics, and advanced forensic techniques. This book is the eighth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-two edited papers from the Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Pretoria, Pretoria, South Africa in the spring of 2012. Advances in Digital Forensics VIII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a File organization (Computer science).
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Computer Appl. in Administrative Data Processing.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Files.
|
700 |
1 |
|
|a Peterson, Gilbert.
|e editor.
|
700 |
1 |
|
|a Shenoi, Sujeet.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642339615
|
830 |
|
0 |
|a IFIP Advances in Information and Communication Technology,
|x 1868-4238 ;
|v 383
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-33962-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|