Item type Location Call Number Status Date Due
E-Book E-Book AUM Main Library 005.8 (Browse Shelf) Not for loan

History, Historiography and the Hermeneutics of the Hard -- Protecting Third Party Privacy in Digital Forensic Investigations -- On the Scientific Maturity of Digital Forensics Research -- Cognitive Approaches for Digital Forensic Readiness Planning -- A Harmonized Process Model for Digital Forensic Investigation Readiness -- Evaluation of the Semi-Automated Crime-Specific Digital Triage Process Model -- Reducing the Time Required for Hashing Operations -- Hash-Based File Content Identification Using Distributed Systems -- Creating Super Timelines in Windows Investigations -- Using a Goal-Driven Approach in the Investigation of a Questioned Contract -- File Fragment Analysis Using Normalized Compression Distance -- Quantifying Windows File Slack Size and Stability -- Automating Video File Carving and Content Identification -- Data Recovery from Proprietary-Formatted CCTV Hard Disks -- Creating Integrated Evidence Graphs for Network Forensics -- A Generic Bayesian Belief Model for Similar Cyber Crimes -- An Empirical Study Profiling Internet Pirates -- Real-Time Covert Timing Channel Detection in Networked Virtual Environments -- Impact of Cloud Computing on Digital Forensic Investigations -- Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments -- Comparison of the Data Recovery Function of Forensic Tools -- Security Analysis and Decryption of FileVault 2 -- Detecting Counterfeit Currency and Identifying its Source -- Towards Active Linguistic Authentication.

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IX describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, Filesystem Forensics, Network Forensics, Cloud Forensics, Forensic Tools, and Advanced Forensic Techniques. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2013. Advances in Digital Forensics IX is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

There are no comments for this item.

Log in to your account to post a comment.