Narrow your search
Listing 1 - 10 of 12 << page
of 2
>>
Sort by

Book
Where the Money Goes: Understanding Litigant Expenditures for Producing Electronic Discovery
Authors: ---
ISBN: 0833077740 0833068768 9780833068767 9780833077745 Year: 2012 Publisher: RAND Corporation


Periodical
The journal of digital forensics, security and law : JDFSL.
Author:
ISSN: 15587215 15587223 Year: 2006 Publisher: Farmville, VA : Association of Digital Forensics, Security and Law,

The best damn cybercrime and digital forensics book period
Author:
ISBN: 1281096385 9786611096380 0080556086 1597492280 9781597492287 9781597492287 9780080556086 9781281096388 Year: 2007 Publisher: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor],

Loading...
Export citation

Choose an application

Bookmark

Abstract

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be 1.8 billion doll


Book
Electronic Evidence
Author:
ISBN: 1911507079 1911507052 9781911507079 1911507095 9781911507055 Year: 2017 Publisher: University of London Press


Book
Strategic leadership in digital evidence
Author:
ISBN: 012822763X 0128196181 9780128227633 9780128196182 Year: 2021 Publisher: London, United Kingdom


Book
Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects
Authors: ---
ISBN: 9786611020262 1281020265 1597499846 1597499854 9781281020260 9781597499842 Year: 2013 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin


Book
Advances in digital forensics IV
Author:
ISBN: 0387849270 0387849262 Year: 2008 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ADVANCES IN DIGITAL FORENSICS IV Edited by: Indrajit Ray and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: - Themes and Issues - Evidence Recovery - Evidence Integrity - Evidence Management - Forensic Techniques - Network Forensics - Portable Electronic Device Forensics - Event Data Recorder Forensics - Novel Investigation Techniques - Forensic Tools This book is the fourth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008. Advances in Digital Forensics IV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Indrajit Ray is an Associate Professor of Computer Science at Colorado State University, Fort Collins, Colorado, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Keywords

Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Data processing --- Investigation --- Criminal evidence --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Criminalistics --- Forensic science --- Science --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Information systems. --- User Interfaces and Human Computer Interaction. --- Computer Science, general. --- Computers and Society. --- Computer Applications. --- Information Systems and Communication Service. --- Informatics --- User interfaces (Computer systems). --- Computers and civilization. --- Application software. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Digital preservation


Book
Advances in digital forensics III : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007
Authors: --- ---
ISBN: 9780387737416 0387737413 0387737421 Year: 2007 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ADVANCES IN DIGITAL FORENSICS III Edited by: Philip Craiger and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics III describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: - Legal Issues - Insider Threat Detection - Rootkit Detection - Authorship Attribution - Forensic Techniques - File System Forensics - Network Forensics - Portable Electronic Device Forensics - Evidence Analysis and Management - Formal Methods This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-four edited papers from the Third Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2007. Advances in Digital Forensics III is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Philip Craiger is an Assistant Professor of Engineering Technology and Assistant Director for Digital Evidence at the National Center for Forensic Science, University of Central Florida, Orlando, Florida, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Keywords

Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Criminalistique --- Electronique dans les enquêtes criminelles --- Criminalité informatique --- Communication électronique des pièces --- Preuve (Droit pénal) --- Data processing --- Congresses. --- Investigation --- Informatique --- Congrès --- Enquêtes --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Medicine. --- Forensic science. --- Computer science. --- Biomedicine. --- Forensic Science. --- Computer Science, general. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Crime --- Privacy, Right of --- Science --- Forensic medicine. --- Informatics --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Medicine --- Medical laws and legislation --- Electronic evidence --- Digital preservation

Advances in digital forensics II : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 29-February 1, 2006
Authors: --- ---
ISBN: 9780387368917 0387368906 9780387368900 9786612970610 1282970615 0387368914 Year: 2006 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ADVANCES IN DIGITAL FORENSICS II Edited by: Martin S. Olivier and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance – investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues in Digital Forensics Evidence Collecting and Handling Forensic Techniques Operating System and File System Forensics Network Forensics Portable Electronic Device Forensics Linux and File System Forensics Training, Governance and Legal Issues This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.

Keywords

Computer Science. --- Computer Communication Networks. --- Database Management. --- Information Storage and Retrieval. --- Computer science. --- Database management. --- Information storage and retrieval systems. --- Informatique --- Réseaux d'ordinateurs --- Bases de données --- Systèmes d'information --- Gestion --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Telecommunications --- Criminology, Penology & Juvenile Delinquency --- Electrical & Computer Engineering --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Data processing --- Investigation --- Information Technology --- Computer Science (Hardware & Networks) --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Electronic bugging --- Electronic listening devices --- Criminalistics --- Forensic science --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer communication systems. --- Computer security. --- Information storage and retrieval. --- Systems and Data Security. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Information storage and retrieva. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Discovery (Law) --- Electronic evidence --- Digital preservation --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Crime --- Privacy, Right of


Book
Advances in Digital Forensics V : Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers
Authors: --- ---
ISBN: 364204154X 3642041558 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics V describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues Forensic Techniques Integrity and Privacy Network Forensics Forensic Computing Investigative Techniques Legal Issues Evidence Management This book is the fifth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-three edited papers from the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2009. Advances in Digital Forensics V is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Keywords

Computer crimes --Investigation --Congresses. --- Electronic discovery (Law) --Congresses. --- Electronics in criminal investigation --Congresses. --- Evidence, Criminal --Congresses. --- Forensic sciences --Data processing --Congresses. --- Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Engineering & Applied Sciences --- Social Welfare & Social Work --- Social Sciences --- Data processing --- Investigation --- Criminalistics --- Forensic science --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer security. --- Computers. --- Data mining. --- Pattern recognition. --- Law and legislation. --- Criminology and Criminal Justice. --- Criminology and Criminal Justice, general. --- Systems and Data Security. --- Information Systems and Communication Service. --- Legal Aspects of Computing. --- Data Mining and Knowledge Discovery. --- Pattern Recognition. --- Science --- Criminal investigation --- Discovery (Law) --- Crime --- Privacy, Right of --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Criminology. --- Information systems. --- Computers --- Optical pattern recognition. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Cyberspace --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Social sciences --- Criminals --- Law and legislation --- Protection --- Security measures --- Study and teaching --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Electronic evidence --- Digital preservation --- Data protection. --- Computer networks. --- Information technology --- Pattern recognition systems. --- Data and Information Security. --- Computer Communication Networks. --- Automated Pattern Recognition. --- Pattern classification systems --- Pattern recognition computers --- Computer vision --- Technology and law --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing

Listing 1 - 10 of 12 << page
of 2
>>
Sort by