aller au contenu
Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers Aperçu de cet ouvrage
FermerAperçu de cet ouvrage
Vérification...

Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers

Auteur : Pavel Gladyshev; Marcus K Rogers
Éditeur : Berlin ; New York : Springer, ©2012.
Collection : Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering, 88.
Édition/format :   Livre électronique : Document : Conference publication : EnglishVoir toutes les éditions et tous les formats
Base de données :WorldCat
Résumé :
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including  Lire la suite...
Évaluation :

(pas encore évalué) 0 avec des critiques - Soyez le premier.

Sujets
Plus comme ceci

 

Trouver un exemplaire en ligne

Liens vers cet ouvrage

Trouver un exemplaire dans la bibliothèque

&AllPage.SpinnerRetrieving; Recherche de bibliothèques qui possèdent cet ouvrage...

Détails

Genre/forme : Electronic books
Conference papers and proceedings
Congresses
Format – détails additionnels : Printed edition:
Type d’ouvrage : Conference publication, Document, Ressource Internet
Format : Internet Resource, Computer File
Tous les auteurs / collaborateurs : Pavel Gladyshev; Marcus K Rogers
ISBN : 9783642355158 3642355153
Numéro OCLC : 822978263
Description : 1 online resource (xi, 296 pages) : illustrations.
Contenu : Cybercrime Investigations --
The Role of Perception in Age Estimation / Cynthia A. Murphy --
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers / Kathryn C. Seigfried-Spellar, Gary R. Bertoline, Marcus K. Rogers --
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media / Esti Peshin --
Mobile Device Forensics --
All Bot Net: A Need for Smartphone P2P Awareness / Kelly A. Cole, Ramindu L. Silva, Richard P. Mislan --
Results of Field Testing Mobile Phone Shielding Devices / Eric Katz, Richard Mislan, Marcus Rogers, Anthony Smith --
Windows Phone 7 from a Digital Forensics' Perspective / Thomas Schaefer, Hans Höfken, Marko Schuba --
An Agent Based Tool for Windows Mobile Forensics / S. Satheesh Kumar, Bibin Thomas, K.L. Thomas --
Forensic Extractions of Data from the Nokia N900 / Mark Lohrum. New Developments in Digital Forensics --
A Strategy for Testing Metadata Based Deleted File Recovery Tools / James R. Lyle --
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus / Neil C. Rowe, Simson L. Garfinkel --
A Novel Methodology for Malware Intrusion Attack Path Reconstruction / Ahmed F. Shosha, Joshua I. James, Pavel Gladyshev --
Performance Issues About Context-Triggered Piecewise Hashing / Frank Breitinger, Harald Baier --
Short Papers --
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment / Sean Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France --
Yahoo! Messenger Forensics on Windows Vista and Windows 7 / Matthew Levendoski, Tejashree Datar, Marcus Rogers --
Robust Hashing for Efficient Forensic Analysis of Image Sets / Martin Steinebach. Tracking User Activity on Personal Computers / Anthony Keane, Stephen O'Shaughnessy --
Digital Forensics Techniques --
The Forensic Value of the Windows 7 Jump List / Alexander G. Barnett --
Finding Forensic Information on Creating a Folder in LogFile of NTFS / Gyu-Sang Cho, Marcus K. Rogers --
Rescuing Digital Data from Submerged HDD / Toshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida --
Digital Forensics Education --
Evaluating the Forensic Image Generator Generator / Christian Moch, Felix C. Freiling --
Internet and Network Investigations --
Forensic Extractions of Data from the Nokia N900 / Mark Lohrum --
Formal Methods of Digital Forensics --
A Forensic Framework for Incident Analysis Applied to the Insider Threat / Clive Blackwell --
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid / Serguei A. Mokhov, Joey Paquet, Mourad Debbabi.
Titre de collection : Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering, 88.
Autres titres : ICDF2C 2011
Responsabilité : Pavel Gladyshev, Marcus K. Rogers (eds.).
Plus d’informations :

Résumé :

This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.

Critiques

Critiques d’utilisateurs
Récupération des critiques de GoodReads...
Récuperation des critiques DOGObooks…

Étiquettes

Soyez le premier.
Confirmez cette demande

Vous avez peut-être déjà demandé cet ouvrage. Veuillez sélectionner OK si vous voulez poursuivre avec cette demande quand même.

Données liées


Primary Entity

<http://www.worldcat.org/oclc/822978263> # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "822978263" ;
   library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/3861818422#Place/berlin> ; # Berlin
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   schema:about <http://dewey.info/class/364.168/e23/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/3861818422#Thing/data_protection> ; # Data protection.
   schema:about <http://experiment.worldcat.org/entity/work/data/3861818422#Thing/computer_science> ; # Computer science.
   schema:about <http://experiment.worldcat.org/entity/work/data/3861818422#Thing/systems_and_data_security> ; # Systems and Data Security.
   schema:about <http://experiment.worldcat.org/entity/work/data/3861818422#Thing/computer_system_implementation> ; # Computer System Implementation.
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/3861818422#Thing/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems.
   schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
   schema:about <http://experiment.worldcat.org/entity/work/data/3861818422#Thing/computer_network_architectures> ; # Computer network architectures.
   schema:about <http://id.loc.gov/authorities/subjects/sh85029493> ; # Computer crimes--Investigation
   schema:about <http://experiment.worldcat.org/entity/work/data/3861818422#Topic/computer_security> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/3861818422#Topic/informatique> ; # Informatique
   schema:alternateName "ICDF2C 2011" ;
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/159899356> ; # Marcus K. Rogers
   schema:contributor <http://viaf.org/viaf/295789650> ; # Pavel Gladyshev
   schema:copyrightYear "2012" ;
   schema:creator <http://experiment.worldcat.org/entity/work/data/3861818422#Meeting/international_conference_on_digital_forensics_and_cyber_crime_3rd_2011_dublin_ireland> ; # International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)
   schema:datePublished "2012" ;
   schema:description "This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/3861818422> ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:genre "Conference publication"@en ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://worldcat.org/issn/1867-8211> ; # Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3861818422#Series/lecture_notes_of_the_institute_for_computer_sciences_social_informatics_and_telecommunications_engineering> ; # Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/3861818422#CreativeWork/> ;
   schema:name "Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers"@en ;
   schema:productID "822978263" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/822978263#PublicationEvent/berlin_new_york_springer_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/3861818422#Agent/springer> ; # Springer
   schema:url <http://dx.doi.org/10.1007/978-3-642-35515-8> ;
   schema:workExample <http://worldcat.org/isbn/9783642355158> ;
   schema:workExample <http://dx.doi.org/10.1007/978-3-642-35515-8> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/822978263> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
   schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Meeting/international_conference_on_digital_forensics_and_cyber_crime_3rd_2011_dublin_ireland> # International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/3861818422#Place/dublin_ireland> ; # Dublin, Ireland)
   schema:name "International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)" ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Place/dublin_ireland> # Dublin, Ireland)
    a schema:Place ;
   schema:name "Dublin, Ireland)" ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Series/lecture_notes_of_the_institute_for_computer_sciences_social_informatics_and_telecommunications_engineering> # Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/822978263> ; # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
   schema:name "Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Thing/computer_network_architectures> # Computer network architectures.
    a schema:Thing ;
   schema:name "Computer network architectures." ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Thing/computer_science> # Computer science.
    a schema:Thing ;
   schema:name "Computer science." ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Thing/computer_system_implementation> # Computer System Implementation.
    a schema:Thing ;
   schema:name "Computer System Implementation." ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Thing/data_protection> # Data protection.
    a schema:Thing ;
   schema:name "Data protection." ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Thing/management_of_computing_and_information_systems> # Management of Computing and Information Systems.
    a schema:Thing ;
   schema:name "Management of Computing and Information Systems." ;
    .

<http://experiment.worldcat.org/entity/work/data/3861818422#Thing/systems_and_data_security> # Systems and Data Security.
    a schema:Thing ;
   schema:name "Systems and Data Security." ;
    .

<http://id.loc.gov/authorities/subjects/sh85029493> # Computer crimes--Investigation
    a schema:Intangible ;
   schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
   schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/159899356> # Marcus K. Rogers
    a schema:Person ;
   schema:familyName "Rogers" ;
   schema:givenName "Marcus K." ;
   schema:name "Marcus K. Rogers" ;
    .

<http://viaf.org/viaf/295789650> # Pavel Gladyshev
    a schema:Person ;
   schema:familyName "Gladyshev" ;
   schema:givenName "Pavel" ;
   schema:name "Pavel Gladyshev" ;
    .

<http://worldcat.org/entity/work/data/3861818422#CreativeWork/>
    a schema:CreativeWork ;
   schema:description "Printed edition:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/822978263> ; # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
    .

<http://worldcat.org/isbn/9783642355158>
    a schema:ProductModel ;
   schema:isbn "3642355153" ;
   schema:isbn "9783642355158" ;
    .

<http://worldcat.org/issn/1867-8211> # Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/822978263> ; # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
   schema:issn "1867-8211" ;
   schema:name "Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering," ;
    .

<http://www.worldcat.org/title/-/oclc/822978263>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/822978263> ; # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
   schema:dateModified "2017-01-20" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Fermer la fenêtre

Veuillez vous identifier dans WorldCat 

Dont have an account? You can easily créez un compte gratuit.