//]]>

Advances in Digital Forensics IX (Record no. 22414)

000 -LEADER
fixed length control field 05584nam a22004935i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151130.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131009s2013 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642411489
978-3-642-41148-9
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2013.
912 ## -
-- ZDB-2-SCS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Peterson, Gilbert.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Advances in Digital Forensics IX
Medium [electronic resource] :
Remainder of title 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers /
Statement of responsibility, etc edited by Gilbert Peterson, Sujeet Shenoi.
300 ## - PHYSICAL DESCRIPTION
Extent XX, 398 p. 92 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title IFIP Advances in Information and Communication Technology,
International Standard Serial Number 1868-4238 ;
Volume number/sequential designation 410
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note History, Historiography and the Hermeneutics of the Hard -- Protecting Third Party Privacy in Digital Forensic Investigations -- On the Scientific Maturity of Digital Forensics Research -- Cognitive Approaches for Digital Forensic Readiness Planning -- A Harmonized Process Model for Digital Forensic Investigation Readiness -- Evaluation of the Semi-Automated Crime-Specific Digital Triage Process Model -- Reducing the Time Required for Hashing Operations -- Hash-Based File Content Identification Using Distributed Systems -- Creating Super Timelines in Windows Investigations -- Using a Goal-Driven Approach in the Investigation of a Questioned Contract -- File Fragment Analysis Using Normalized Compression Distance -- Quantifying Windows File Slack Size and Stability -- Automating Video File Carving and Content Identification -- Data Recovery from Proprietary-Formatted CCTV Hard Disks -- Creating Integrated Evidence Graphs for Network Forensics -- A Generic Bayesian Belief Model for Similar Cyber Crimes -- An Empirical Study Profiling Internet Pirates -- Real-Time Covert Timing Channel Detection in Networked Virtual Environments -- Impact of Cloud Computing on Digital Forensic Investigations -- Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments -- Comparison of the Data Recovery Function of Forensic Tools -- Security Analysis and Decryption of FileVault 2 -- Detecting Counterfeit Currency and Identifying its Source -- Towards Active Linguistic Authentication.
520 ## - SUMMARY, ETC.
Summary, etc Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IX describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, Filesystem Forensics, Network Forensics, Cloud Forensics, Forensic Tools, and Advanced Forensic Techniques. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2013. Advances in Digital Forensics IX is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Data encryption (Computer science).
Topical term or geographic name as entry element Information systems.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Computers and Society.
Topical term or geographic name as entry element Computer Appl. in Administrative Data Processing.
Topical term or geographic name as entry element Data Encryption.
Topical term or geographic name as entry element Computer Communication Networks.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Shenoi, Sujeet.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642411472
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-41148-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-24AUM Main Library2014-04-24 2014-04-24 E-Book   AUM Main Library005.8

Languages: 
English |
العربية