Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Digital forensic science --- Forensic engineering --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Engineering --- Forensic sciences --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Digital preservation
Choose an application
Wireless communication systems --- Computer networks --- Computer crimes --- Data protection --- Privacy, Right of --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Confidential communications --- Right to be forgotten --- Secrecy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures --- Investigation --- Law and legislation
Choose an application
Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance. Audience This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data.
Computer networks --- Computer security. --- Data mining. --- Computer crimes --- Security measures. --- Investigation. --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Protection --- Security measures --- Information systems. --- Information Systems and Communication Service. --- Information Systems Applications (incl. Internet). --- Computers. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
ADVANCES IN DIGITAL FORENSICS Edited by: Mark Pollitt and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance – investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues in Digital Forensics Investigative Techniques Network Forensics Portable Electronic Device Forensics Linux and File System Forensics Applications and Techniques This book is the first volume of a new series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in February 2005. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Mark Pollitt is President of Digital Evidence Professional Services, Inc., Ellicott City, Maryland, USA. Mr. Pollitt, who is retired from the Federal Bureau of Investigation (FBI), served as the Chief of the FBI's Computer Analysis Response Team, and Director of the Regional Computer Forensic Laboratory National Program. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Data processing --- Investigation --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Criminalistique --- Electronique dans les enquêtes criminelles --- Communication électronique des pièces --- Preuve (Droit pénal) --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer science. --- Computer organization. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Science, general. --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Information Storage and Retrieval. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Science --- Crime --- Privacy, Right of --- Information Technology --- Computer Science (Hardware & Networks) --- Computer network architectures. --- Data structures (Computer science) --- Information storage and retrieva. --- Cryptology. --- Data Structures and Information Theory. --- Information retrieval. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Protection --- Security measures --- Information storage and retrieval systems. --- Data structures (Computer scienc. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Organization, Computer --- Electronic evidence --- Digital preservation
Listing 1 - 4 of 4 |
Sort by
|