Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Choose an application
Electronic discovery (Law) --- Law --- Regional and International Law --- digital forensics --- cyber forensics --- law --- security --- cyber security --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Discovery (Law)
Choose an application
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from 252 million in 2004 to 630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be 1.8 billion doll
Computer crimes --- Electronic discovery (Law) --- Investigation. --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Discovery (Law) --- Criminal investigation --- Information Technology --- General and Others
Choose an application
Electronic evidence. --- Electronic discovery (Law) --- Electronic records --- Computer files --- Evidence, Documentary. --- Law and legislation. --- Documentary evidence --- Evidence (Law) --- Legal documents --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Discovery (Law) --- Digital evidence --- Evidence, Documentary
Choose an application
Electronic discovery (Law) --- Evidence, Documentary. --- Electronic records --- Law and legislation. --- Documentary evidence --- Evidence (Law) --- Legal documents --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Discovery (Law)
Choose an application
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin
Computer crimes - Investigation. --- Computer crimes -- Investigation. --- Computer security. --- Criminal investigation. --- Criminal procedure. --- Electronic evidence. --- Forensic sciences --- Electronics in criminal investigation. --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal. --- Data processing. --- Investigation. --- Information Technology --- General and Others --- Criminal evidence --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Discovery (Law) --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Electronic bugging --- Electronic listening devices --- Criminalistics --- Forensic science --- Science
Choose an application
ADVANCES IN DIGITAL FORENSICS IV Edited by: Indrajit Ray and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: - Themes and Issues - Evidence Recovery - Evidence Integrity - Evidence Management - Forensic Techniques - Network Forensics - Portable Electronic Device Forensics - Event Data Recorder Forensics - Novel Investigation Techniques - Forensic Tools This book is the fourth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008. Advances in Digital Forensics IV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Indrajit Ray is an Associate Professor of Computer Science at Colorado State University, Fort Collins, Colorado, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Data processing --- Investigation --- Criminal evidence --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Criminalistics --- Forensic science --- Science --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Information systems. --- User Interfaces and Human Computer Interaction. --- Computer Science, general. --- Computers and Society. --- Computer Applications. --- Information Systems and Communication Service. --- Informatics --- User interfaces (Computer systems). --- Computers and civilization. --- Application software. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Digital preservation
Choose an application
ADVANCES IN DIGITAL FORENSICS III Edited by: Philip Craiger and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics III describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: - Legal Issues - Insider Threat Detection - Rootkit Detection - Authorship Attribution - Forensic Techniques - File System Forensics - Network Forensics - Portable Electronic Device Forensics - Evidence Analysis and Management - Formal Methods This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-four edited papers from the Third Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2007. Advances in Digital Forensics III is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Philip Craiger is an Assistant Professor of Engineering Technology and Assistant Director for Digital Evidence at the National Center for Forensic Science, University of Central Florida, Orlando, Florida, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Criminalistique --- Electronique dans les enquêtes criminelles --- Criminalité informatique --- Communication électronique des pièces --- Preuve (Droit pénal) --- Data processing --- Congresses. --- Investigation --- Informatique --- Congrès --- Enquêtes --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Medicine. --- Forensic science. --- Computer science. --- Biomedicine. --- Forensic Science. --- Computer Science, general. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Crime --- Privacy, Right of --- Science --- Forensic medicine. --- Informatics --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Medicine --- Medical laws and legislation --- Electronic evidence --- Digital preservation
Choose an application
ADVANCES IN DIGITAL FORENSICS II Edited by: Martin S. Olivier and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance – investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues in Digital Forensics Evidence Collecting and Handling Forensic Techniques Operating System and File System Forensics Network Forensics Portable Electronic Device Forensics Linux and File System Forensics Training, Governance and Legal Issues This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
Computer Science. --- Computer Communication Networks. --- Database Management. --- Information Storage and Retrieval. --- Computer science. --- Database management. --- Information storage and retrieval systems. --- Informatique --- Réseaux d'ordinateurs --- Bases de données --- Systèmes d'information --- Gestion --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Telecommunications --- Criminology, Penology & Juvenile Delinquency --- Electrical & Computer Engineering --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Data processing --- Investigation --- Information Technology --- Computer Science (Hardware & Networks) --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Electronic bugging --- Electronic listening devices --- Criminalistics --- Forensic science --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer communication systems. --- Computer security. --- Information storage and retrieval. --- Systems and Data Security. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Information storage and retrieva. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Discovery (Law) --- Electronic evidence --- Digital preservation --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Crime --- Privacy, Right of
Choose an application
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics V describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues Forensic Techniques Integrity and Privacy Network Forensics Forensic Computing Investigative Techniques Legal Issues Evidence Management This book is the fifth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-three edited papers from the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2009. Advances in Digital Forensics V is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Computer crimes --Investigation --Congresses. --- Electronic discovery (Law) --Congresses. --- Electronics in criminal investigation --Congresses. --- Evidence, Criminal --Congresses. --- Forensic sciences --Data processing --Congresses. --- Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Engineering & Applied Sciences --- Social Welfare & Social Work --- Social Sciences --- Data processing --- Investigation --- Criminalistics --- Forensic science --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer security. --- Computers. --- Data mining. --- Pattern recognition. --- Law and legislation. --- Criminology and Criminal Justice. --- Criminology and Criminal Justice, general. --- Systems and Data Security. --- Information Systems and Communication Service. --- Legal Aspects of Computing. --- Data Mining and Knowledge Discovery. --- Pattern Recognition. --- Science --- Criminal investigation --- Discovery (Law) --- Crime --- Privacy, Right of --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Criminology. --- Information systems. --- Computers --- Optical pattern recognition. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Cyberspace --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Social sciences --- Criminals --- Law and legislation --- Protection --- Security measures --- Study and teaching --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Electronic evidence --- Digital preservation --- Data protection. --- Computer networks. --- Information technology --- Pattern recognition systems. --- Data and Information Security. --- Computer Communication Networks. --- Automated Pattern Recognition. --- Pattern classification systems --- Pattern recognition computers --- Computer vision --- Technology and law --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing
Listing 1 - 10 of 12 | << page >> |
Sort by
|