Rogers / Gladyshev | Digital Forensics and Cyber Crime | Buch | 978-3-642-35514-1 | sack.de

Buch, Englisch, Band 88, 297 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 476 g

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Rogers / Gladyshev

Digital Forensics and Cyber Crime

Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers

Buch, Englisch, Band 88, 297 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 476 g

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

ISBN: 978-3-642-35514-1
Verlag: Springer


This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
Rogers / Gladyshev Digital Forensics and Cyber Crime jetzt bestellen!

Zielgruppe


Professional/practitioner

Weitere Infos & Material


The Role of Perception in Age Estimation.- Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers.- Law Enforcement 2.0: Regulating the Lawful Interception of Social Media.- All Bot Net: A Need for Smartphone P2P Awareness.- Results of Field Testing Mobile Phone Shielding Devices.- Windows Phone 7 from a Digital Forensics’ Perspective.- Forensic Extractions of Data from the Nokia N900.- A Strategy for Testing Metadata Based Deleted File Recovery Tools.- Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus.- A Novel Methodology for Malware Intrusion Attack Path Reconstruction.- Performance Issues about Context-Triggered Piecewise Hashing.- Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.- Yahoo! Messenger Forensics on Windows Vista and Windows 7.- Finding Forensic Information on Creating a Folder in $LogFile of NTFS.- Evaluating the Forensic Image Generator Generator.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.