|
|
|
|
LEADER |
02264nmm a2200385 u 4500 |
001 |
EB000386319 |
003 |
EBX01000000000000000239371 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642195136
|
100 |
1 |
|
|a Baggili, Ibrahim
|e [editor]
|
245 |
0 |
0 |
|a Digital Forensics and Cyber Crime
|h Elektronische Ressource
|b Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers
|c edited by Ibrahim Baggili
|
250 |
|
|
|a 1st ed. 2011
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2011, 2011
|
300 |
|
|
|a X, 157 p
|b online resource
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Bioinformatics
|
653 |
|
|
|a Computer vision
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Computer Vision
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Information technology / Law and legislation
|
653 |
|
|
|a Computers / Law and legislation
|
653 |
|
|
|a IT Operations
|
653 |
|
|
|a Legal Aspects of Computing
|
653 |
|
|
|a Computers and civilization
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
|
028 |
5 |
0 |
|a 10.1007/978-3-642-19513-6
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-19513-6?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 343.0999
|
520 |
|
|
|a This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 14 papers in this volume descibe the various applications of this technology and cover a wide range of topics including law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare
|