000 -LEADER |
fixed length control field |
03629nam a22005055i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151118.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100301s2010 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642115349 |
|
978-3-642-11534-9 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.D343 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.312 |
Edition number |
23 |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg, |
-- |
2010. |
912 ## - |
-- |
ZDB-2-SCS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Goel, Sanjay. |
Relator term |
editor. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Digital Forensics and Cyber Crime |
Medium |
[electronic resource] : |
Remainder of title |
First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers / |
Statement of responsibility, etc |
edited by Sanjay Goel. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XII, 171p. 74 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, |
International Standard Serial Number |
1867-8211 ; |
Volume number/sequential designation |
31 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Full and Short Papers -- Digital Evidence Composition in Fraud Detection -- iForensics: Forensic Analysis of Instant Messaging on Smart Phones -- A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks -- SMIRK: SMS Management and Information Retrieval Kit -- Localization and Detection of Vector Logo Image Plagiarism -- Analysis of Free Download Manager for Forensic Artefacts -- On the Reliability of Cell Phone Camera Fingerprint Recognition -- Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank -- Analysis of Evidence Using Formal Event Reconstruction -- Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations -- Digital Evidence Retrieval and Forensic Analysis on Gambling Machine -- Online Acquisition of Digital Forensic Evidence -- Criminal Defense Challenges in Computer Forensics -- Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance -- A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices -- A Host-Based Approach to BotNet Investigation?. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference, ICDF2C 2009, held September 30 - October 2, 2009, in Albany, NY, USA. Digital forensics and cyber crime is a multidisciplinary area that requires expertise in several areas including law, computer science, finance networking, data mining and criminal justice. The 16 papers present the whole gamut of multimedia and handheld device forensics, financial crimes, cyber crime investigations, forensics and law, cyber security and information warfare. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Data mining. |
|
Topical term or geographic name as entry element |
Computer vision. |
|
Topical term or geographic name as entry element |
Biometrics. |
|
Topical term or geographic name as entry element |
Computers |
General subdivision |
Law and legislation. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Data Mining and Knowledge Discovery. |
|
Topical term or geographic name as entry element |
Computers and Society. |
|
Topical term or geographic name as entry element |
Legal Aspects of Computing. |
|
Topical term or geographic name as entry element |
Biometrics. |
|
Topical term or geographic name as entry element |
Computer Imaging, Vision, Pattern Recognition and Graphics. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642115332 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-3-642-11534-9 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |