|
|
|
|
LEADER |
03462nmm a2200421 u 4500 |
001 |
EB000390910 |
003 |
EBX01000000000000000243963 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642355158
|
100 |
1 |
|
|a Gladyshev, Pavel
|e [editor]
|
245 |
0 |
0 |
|a Digital Forensics and Cyber Crime
|h Elektronische Ressource
|b Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers
|c edited by Pavel Gladyshev, Marcus K. Rogers
|
250 |
|
|
|a 1st ed. 2012
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012, 2012
|
300 |
|
|
|a XII, 297 p. 94 illus
|b online resource
|
505 |
0 |
|
|a The Role of Perception in Age Estimation -- Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers -- Law Enforcement 2.0: Regulating the Lawful Interception of Social Media -- All Bot Net: A Need for Smartphone P2P Awareness -- Results of Field Testing Mobile Phone Shielding Devices -- Windows Phone 7 from a Digital Forensics’ Perspective -- Forensic Extractions of Data from the Nokia N900 -- A Strategy for Testing Metadata Based Deleted File Recovery Tools -- Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus -- A Novel Methodology for Malware Intrusion Attack Path Reconstruction -- Performance Issues about Context-Triggered Piecewise Hashing -- Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment -- Yahoo! Messenger Forensics on Windows Vista and Windows 7 -- Finding Forensic Information on Creating a Folder in $LogFile of NTFS -- Evaluating the Forensic Image Generator Generator
|
653 |
|
|
|a Computer systems
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Electronic commerce
|
653 |
|
|
|a Computer System Implementation
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Data Structures and Information Theory
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data structures (Computer science)
|
653 |
|
|
|a e-Commerce and e-Business
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a IT Operations
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Rogers, Marcus K.
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
|
028 |
5 |
0 |
|a 10.1007/978-3-642-35515-8
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-35515-8?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices
|