Narrow your search

Library

Odisee (17)

Thomas More Kempen (17)

Thomas More Mechelen (17)

UCLL (17)

VIVES (17)

KU Leuven (16)

ULiège (16)

LUCA School of Arts (11)

UGent (11)

Vlerick Business School (9)

More...

Resource type

book (20)


Language

English (20)


Year
From To Submit

2016 (1)

2015 (2)

2014 (2)

2013 (3)

2012 (1)

More...
Listing 11 - 20 of 20 << page
of 2
>>
Sort by

Book
Dissecting the hack : the V3rb0ten network
Authors: --- --- --- ---
ISBN: 0128042826 0128042788 9780128042823 9780128042786 9780128042786 Year: 2015 Publisher: Amsterdam, Netherlands : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network,"" continues the fic


Book
Cyberforensics : understanding information security investigations
Authors: ---
ISBN: 1607617714 9786612983153 1607617722 1282983156 Year: 2010 Publisher: New York : Humana Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years’ experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.


Book
Windows forensic analysis toolkit : advanced analysis techniques for Windows 7
Authors: ---
ISBN: 1283448009 9786613448002 1597497282 1597497274 9781597497282 9781597497275 Year: 2012 Publisher: Amsterdam : Elsevier/Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Windows is the largest operating system on desktops and servers worldwide, which means more intrusions, malware infections, and cybercrime happen on these systems. Author Harlan Carvey has brought his bestselling book up-to-date by covering the newest version of Windows, Windows 7. Windows Forensic Analysis Toolkit, 3e, covers live and postmortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline w

Keywords

Computer crimes - Investigation - United States - Methodology. --- Computer crimes -- Investigation -- United States -- Methodology. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer security. --- Internet - Security measures. --- Internet -- Security measures. --- Microsoft Windows (Computer file) -- Security measures. --- Computer crimes --- Computer networks --- Internet --- Computer security --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Methodology --- Investigation --- Security measures --- Methodology. --- Security measures. --- Microsoft Windows (Computer file) --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10


Book
Advances in digital forensics III : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007
Authors: --- ---
ISBN: 9780387737416 0387737413 0387737421 Year: 2007 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ADVANCES IN DIGITAL FORENSICS III Edited by: Philip Craiger and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics III describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: - Legal Issues - Insider Threat Detection - Rootkit Detection - Authorship Attribution - Forensic Techniques - File System Forensics - Network Forensics - Portable Electronic Device Forensics - Evidence Analysis and Management - Formal Methods This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-four edited papers from the Third Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2007. Advances in Digital Forensics III is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Philip Craiger is an Assistant Professor of Engineering Technology and Assistant Director for Digital Evidence at the National Center for Forensic Science, University of Central Florida, Orlando, Florida, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Keywords

Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Criminalistique --- Electronique dans les enquêtes criminelles --- Criminalité informatique --- Communication électronique des pièces --- Preuve (Droit pénal) --- Data processing --- Congresses. --- Investigation --- Informatique --- Congrès --- Enquêtes --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Medicine. --- Forensic science. --- Computer science. --- Biomedicine. --- Forensic Science. --- Computer Science, general. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Crime --- Privacy, Right of --- Science --- Forensic medicine. --- Informatics --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Medicine --- Medical laws and legislation --- Electronic evidence --- Digital preservation


Book
Information security and digital forensics : first international conference ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers
Authors: ---
ISBN: 3642115292 9786612836046 3642115306 1282836048 Year: 2010 Publisher: Berlin ; Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Information Security and Digital Forensics, ISDF 2009, which was held in September 2009 in London, United Kingdom. The 19 papers present several security, identity and forensics challenges across the globe to address better the gap in the digital economy market and thus to develop further an appriate security and identity framework and solutions to protect the next generation of IT applications.

Keywords

Computer crimes -- Investigation. --- Computer crimes. --- Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Computer security. --- Computer security --- Forensic sciences --- Computer Science --- Engineering & Applied Sciences --- Data processing --- Data processing. --- Criminalistics --- Forensic science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Digital forensic science. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Pattern recognition. --- Biometrics (Biology). --- Computer Science. --- Systems and Data Security. --- Pattern Recognition. --- Data Encryption. --- Computer Communication Networks. --- Biometrics. --- Data Structures, Cryptology and Information Theory. --- Data protection --- Security systems --- Hacking --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Statistical methods --- Distributed processing --- Criminal investigation --- Optical pattern recognition. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Digital forensic science --- Electronic evidence --- Digital preservation


Book
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
Authors: --- --- --- ---
ISBN: 0124171575 9780124171749 0124171745 9780124171572 Year: 2014 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, fr

Keywords

Computer crimes -- Investigation -- United States -- Methodology. --- Computer networks -- Security measures. --- Computer security. --- Internet -- Security measures. --- Microsoft Windows (Computer file) -- Security measures. --- Computer crimes --- Computer networks --- Internet --- Computer security --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Investigation --- Methodology --- Security measures --- Methodology. --- Security measures. --- Microsoft Windows (Computer file) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10

Advances in digital forensics II : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 29-February 1, 2006
Authors: --- ---
ISBN: 9780387368917 0387368906 9780387368900 9786612970610 1282970615 0387368914 Year: 2006 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ADVANCES IN DIGITAL FORENSICS II Edited by: Martin S. Olivier and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance – investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues in Digital Forensics Evidence Collecting and Handling Forensic Techniques Operating System and File System Forensics Network Forensics Portable Electronic Device Forensics Linux and File System Forensics Training, Governance and Legal Issues This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.

Keywords

Computer Science. --- Computer Communication Networks. --- Database Management. --- Information Storage and Retrieval. --- Computer science. --- Database management. --- Information storage and retrieval systems. --- Informatique --- Réseaux d'ordinateurs --- Bases de données --- Systèmes d'information --- Gestion --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Telecommunications --- Criminology, Penology & Juvenile Delinquency --- Electrical & Computer Engineering --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Data processing --- Investigation --- Information Technology --- Computer Science (Hardware & Networks) --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Electronic bugging --- Electronic listening devices --- Criminalistics --- Forensic science --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer communication systems. --- Computer security. --- Information storage and retrieval. --- Systems and Data Security. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Information storage and retrieva. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Discovery (Law) --- Electronic evidence --- Digital preservation --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Crime --- Privacy, Right of


Book
Managing and mining sensor data
Author:
ISBN: 1489992383 1461463084 1461463092 1299197418 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and  have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process.  Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful. .

Keywords

Computer crimes -- Investigation. --- Computer networks -- Security measures. --- Computer security. --- Data mining. --- Data mining --- Multisensor data fusion --- Sensor networks --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Electrical Engineering --- Sensor networks. --- Information retrieval. --- Computer storage devices. --- Computer memory systems --- Computers --- Electronic digital computers --- Storage devices, Computer --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Networks, Sensor --- Memory systems --- Storage devices --- Computer science. --- Computer communication systems. --- Database management. --- Information storage and retrieval. --- Computer Science. --- Data Mining and Knowledge Discovery. --- Database Management. --- Information Storage and Retrieval. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Database searching --- Computer input-output equipment --- Memory management (Computer science) --- Documentation --- Information science --- Information storage and retrieval systems --- Detectors --- Context-aware computing --- Information storage and retrieva. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Multisensor data fusion.


Book
Advances in Digital Forensics V : Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers
Authors: --- ---
ISBN: 364204154X 3642041558 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics V describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues Forensic Techniques Integrity and Privacy Network Forensics Forensic Computing Investigative Techniques Legal Issues Evidence Management This book is the fifth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-three edited papers from the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2009. Advances in Digital Forensics V is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Keywords

Computer crimes --Investigation --Congresses. --- Electronic discovery (Law) --Congresses. --- Electronics in criminal investigation --Congresses. --- Evidence, Criminal --Congresses. --- Forensic sciences --Data processing --Congresses. --- Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Engineering & Applied Sciences --- Social Welfare & Social Work --- Social Sciences --- Data processing --- Investigation --- Criminalistics --- Forensic science --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer security. --- Computers. --- Data mining. --- Pattern recognition. --- Law and legislation. --- Criminology and Criminal Justice. --- Criminology and Criminal Justice, general. --- Systems and Data Security. --- Information Systems and Communication Service. --- Legal Aspects of Computing. --- Data Mining and Knowledge Discovery. --- Pattern Recognition. --- Science --- Criminal investigation --- Discovery (Law) --- Crime --- Privacy, Right of --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Criminology. --- Information systems. --- Computers --- Optical pattern recognition. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Cyberspace --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Social sciences --- Criminals --- Law and legislation --- Protection --- Security measures --- Study and teaching --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Electronic evidence --- Digital preservation --- Data protection. --- Computer networks. --- Information technology --- Pattern recognition systems. --- Data and Information Security. --- Computer Communication Networks. --- Automated Pattern Recognition. --- Pattern classification systems --- Pattern recognition computers --- Computer vision --- Technology and law --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing

Advances in digital forensics : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005
Authors: --- --- ---
ISBN: 1280619023 9786610619023 0387311637 9780387300122 0387300120 Year: 2005 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ADVANCES IN DIGITAL FORENSICS Edited by: Mark Pollitt and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance – investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues in Digital Forensics Investigative Techniques Network Forensics Portable Electronic Device Forensics Linux and File System Forensics Applications and Techniques This book is the first volume of a new series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in February 2005. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Mark Pollitt is President of Digital Evidence Professional Services, Inc., Ellicott City, Maryland, USA. Mr. Pollitt, who is retired from the Federal Bureau of Investigation (FBI), served as the Chief of the FBI's Computer Analysis Response Team, and Director of the Regional Computer Forensic Laboratory National Program. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.

Keywords

Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Data processing --- Investigation --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Criminalistique --- Electronique dans les enquêtes criminelles --- Communication électronique des pièces --- Preuve (Droit pénal) --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer science. --- Computer organization. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Science, general. --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Information Storage and Retrieval. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Science --- Crime --- Privacy, Right of --- Information Technology --- Computer Science (Hardware & Networks) --- Computer network architectures. --- Data structures (Computer science) --- Information storage and retrieva. --- Cryptology. --- Data Structures and Information Theory. --- Information retrieval. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Protection --- Security measures --- Information storage and retrieval systems. --- Data structures (Computer scienc. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Organization, Computer --- Electronic evidence --- Digital preservation

Listing 11 - 20 of 20 << page
of 2
>>
Sort by