Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Mobile device forensics. --- Electronics in criminal investigation. --- Forensic sciences --- Data processing. --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Electronic bugging --- Electronic listening devices --- Cell phone forensics --- Cell site analysis (Forensic sciences) --- Cell tower tracking (Forensic sciences) --- Forensic radio surveying --- Electronic evidence
Choose an application
El abrigo de Telarmachay está ubicado en los Andes centrales del Perú (departamento de Junín) a una altura de 4420 m s.n.m., en la puna. Los trabajos de excavación, de 1975 a 1980, estuvieron a cargo de un grupo de prehistoriadores franceses y estudiantes peruanos, bajo la dirección de Danièle Lavallée. Las excavaciones, realizadas con el método del decapado por niveles naturales (19 pasadas en total), sobre una superficie de 35 m2, evidenciaron 7 niveles de ocupación sucesivas, cada una de ellas caracterizada por un modo específico de acondicionamiento y utilización del abrigo. La ocupación empieza alrededor de 9000 BP y prosigue casi sin interrupción hasta 2000 BP aproximadamente. A partir de 34 fechados 14C se estableció la cronología siguiente: Fase VII, ca. 9000-7200 BP; Fase VI, ca. 7200-6800 BP; Fase V inf., 6800-5700 BP; Fase V sup., ca. 5700-5000 BP; Fase IV, ca. 5000/4500-3800 BP; Fase III, ca. 3800-2800 BP; Fase II, ca. 2800-2000 BP; (Fase 1, nivel superficial). Una excepcional riqueza en vestigios faunísticos permitió demostrar, por primera vez en los Andes, la existencia de un proceso de domesticación in situ de los camélidos andinos desde 6000-5500 BP aproximadamente: entre 9000 y 7200 BP se practica una caza generalizada de los ongulados (camélidos y cérvidos) que evoluciona , entre 7200 y 6000 BP, hacia una caza especializada de las vicuñas y de los guanacos; entre 6000 y 5500 BP aparecen los primeros animales domesticados, de tipo alpaca y, por fin, después de 5500 BP, el pastoreo de animales completamente domesticados (alpacas y, en proporción menor, llamas). Los análisis arqueozoológicos permitieron también determinar que la ocupación del abrigo fue estacional y tenía lugar entre diciembre y abril. Las otras categorías de vestigios (herramientas y desechos líticos, instrumentos de huesos) fueron analizados morfológica y morfométricamente, lo que permitió percibir su evolución cronológica. Por otra parte, se realizaron varios estudios…
Archaeology --- archéologie --- Pérou --- époque précolombienne --- chronologie --- fouille --- mode d’occupation --- matériel lithique --- matériel osseux --- abri --- culture précéramique --- étude de site --- Telarmachay --- San Pedro de Cajas --- Andes --- arqueología --- Perú --- período precolombino --- cronología --- excavación --- modo de ocupación --- material lítico --- material óseo --- refugio --- cultura precerámica --- estudio de sitio --- archaeology --- chronology --- excavations --- lithic material --- bone material --- shelter --- pre-columbian period --- site analysis --- preceramic culture --- occupancy mode --- report --- Peru
Choose an application
Chapter 1: Introduction to Mobile Forensic Analysis Chapter 2: Introduction to IOS Forensics Chapter 3: Introduction to Android Forensics Chapter 4: Forensic Investigations of Popular Applications on Android and iOS platforms Chapter 5: Forensic Analysis of Telegram Messenger on iOS and Android Smartphones Case Study Chapter 6: Detecting Privacy Leaks Utilizing Digital Forensics and Reverse Engineering Methodologies. Chapter 7: Impact of Device Jailbreaking or Rooting on User Data Integrity in Mobile Forensics Chapter 8: The Impact of Cryptocurrency Mining on Mobile Devices Chapter 9: Mobile Forensic Investigation for WhatsApp Chapter 10: Cloud Computing Forensics: Dropbox Case Study Chapter 11: Malware Forensics for Volatile and non Volatile Memory in Mobile Devices Chapter 12: Mobile Forensic for Key Logger Artifact Chapter 13: Evidence Identification Methods for Android and iOS Mobile Devices with Facebook Messenger Chapter 14: Mobile Forensics for IOS and Android platforms: Chrome app artifacts depending on SQLite Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings.
Android (Electronic resource) --- Digital forensic science. --- Mobile device forensics. --- Smartphones. --- iOS (Electronic resource). --- Smart cell phones --- Smart phones --- Cell phones --- Pocket computers --- Cell phone forensics --- Cell site analysis (Forensic sciences) --- Cell tower tracking (Forensic sciences) --- Forensic radio surveying --- Electronic evidence --- Forensic sciences --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Digital preservation --- i Operating system --- iOS 4.0 --- iOs 5 --- iOS operating system --- iPhone OS --- iOS (Electronic resource) --- Android operating system (Electronic resource) --- Android OS (Electronic resource) --- Google Android (Electronic resource) --- Android mobile operating system (Electronic resource)
Choose an application
Chapter 1: Introduction to Mobile Forensic Analysis Chapter 2: Introduction to IOS Forensics Chapter 3: Introduction to Android Forensics Chapter 4: Forensic Investigations of Popular Applications on Android and iOS platforms Chapter 5: Forensic Analysis of Telegram Messenger on iOS and Android Smartphones Case Study Chapter 6: Detecting Privacy Leaks Utilizing Digital Forensics and Reverse Engineering Methodologies. Chapter 7: Impact of Device Jailbreaking or Rooting on User Data Integrity in Mobile Forensics Chapter 8: The Impact of Cryptocurrency Mining on Mobile Devices Chapter 9: Mobile Forensic Investigation for WhatsApp Chapter 10: Cloud Computing Forensics: Dropbox Case Study Chapter 11: Malware Forensics for Volatile and non Volatile Memory in Mobile Devices Chapter 12: Mobile Forensic for Key Logger Artifact Chapter 13: Evidence Identification Methods for Android and iOS Mobile Devices with Facebook Messenger Chapter 14: Mobile Forensics for IOS and Android platforms: Chrome app artifacts depending on SQLite Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings.
Mobile device forensics. --- Smartphones. --- Digital forensic science. --- iOS (Electronic resource) --- Android (Electronic resource) --- Smart cell phones --- Smart phones --- Cell phones --- Pocket computers --- Cell phone forensics --- Cell site analysis (Forensic sciences) --- Cell tower tracking (Forensic sciences) --- Forensic radio surveying --- Electronic evidence --- Forensic sciences --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Digital preservation --- Android operating system (Electronic resource) --- Android OS (Electronic resource) --- Google Android (Electronic resource) --- Android mobile operating system (Electronic resource) --- i Operating system --- iOS 4.0 --- iOs 5 --- iOS operating system --- iPhone OS
Listing 1 - 4 of 4 |
Sort by
|