Narrow your search

Library

KU Leuven (4)

ULiège (4)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

UGent (2)

ULB (2)

VIVES (2)


Resource type

book (4)


Language

English (4)


Year
From To Submit

2005 (4)

Listing 1 - 4 of 4
Sort by

Book
First International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 7-9 November 2005, Taipei, Taiwan
Authors: --- ---
ISBN: 0769524788 1509099735 9781509099733 Year: 2005 Publisher: [Place of publication not identified] IEEE Computer Society


Book
2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005
Author:
ISBN: 0780394682 1538600919 9781538600917 Year: 2005 Publisher: [Place of publication not identified] IEEE


Book
Managing cyber threats : issues, approaches, and challenges
Authors: --- ---
ISBN: 1280311991 9786610311996 0387242309 0387242260 1441937056 Year: 2005 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance. Audience This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data.

Advances in digital forensics : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005
Authors: --- --- ---
ISBN: 1280619023 9786610619023 0387311637 9780387300122 0387300120 Year: 2005 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ADVANCES IN DIGITAL FORENSICS Edited by: Mark Pollitt and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance – investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues in Digital Forensics Investigative Techniques Network Forensics Portable Electronic Device Forensics Linux and File System Forensics Applications and Techniques This book is the first volume of a new series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in February 2005. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Mark Pollitt is President of Digital Evidence Professional Services, Inc., Ellicott City, Maryland, USA. Mr. Pollitt, who is retired from the Federal Bureau of Investigation (FBI), served as the Chief of the FBI's Computer Analysis Response Team, and Director of the Regional Computer Forensic Laboratory National Program. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.

Keywords

Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Data processing --- Investigation --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Criminalistique --- Electronique dans les enquêtes criminelles --- Communication électronique des pièces --- Preuve (Droit pénal) --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer science. --- Computer organization. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Science, general. --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Information Storage and Retrieval. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Science --- Crime --- Privacy, Right of --- Information Technology --- Computer Science (Hardware & Networks) --- Computer network architectures. --- Data structures (Computer science) --- Information storage and retrieva. --- Cryptology. --- Data Structures and Information Theory. --- Information retrieval. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Protection --- Security measures --- Information storage and retrieval systems. --- Data structures (Computer scienc. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Organization, Computer --- Electronic evidence --- Digital preservation

Listing 1 - 4 of 4
Sort by