Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.
Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.
This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008. Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
Produktdetails
IFIP Advances in Information and Communication Technology 285
Artikelnr. des Verlages: 12465941, 978-0-387-84926-3
2008 edition
Seitenzahl: 366
Erscheinungstermin: 28. August 2008
Englisch
Abmessung: 234mm x 155mm x 22mm
Gewicht: 721g
ISBN-13: 9780387849263
ISBN-10: 0387849262
Artikelnr.: 24924755
Herstellerkennzeichnung
Libri GmbH
Europaallee 1
36244 Bad Hersfeld
06621 890
Inhaltsangabe
Themes and Issues.- When is Digital Evidence Forensically Sound?.- Applying Traditional Forensic Taxonomy to Digital Forensics.- Evidence Recovery.- Recovering Data from Failing Floppy Disks.- Extracting Evidence Using Google Desktop Search.- Evaluation of Registry Data Removal by Shredder Programs.- Evidence Integrity.- Using Boot Control to Preserve the Integrity of Evidence.- Hypothesis-Based Investigation of Digital Timestamps.- Improving Disk Sector Integrity Using K-Dimension Hashing.- Evidence Management.- Class-Aware Similarity Hashing for Data Classification.- Applying Topic Modeling to Forensic Data.- Forensic Techniques.- Forensic Analysis of Volatile Instant Messaging.- Timely Rootkit Detection During Live Response.- Network Forensics.- Identifying and Analyzing Web Server Attacks.- Forensic Web Services.- Detecting Remote Exploits Using Data Mining.- Portable Electronic Device Forensics.- Using Sensor Dirt for Toolmark Analysis of Digital Photographs.- A New Feature-Based Method for Source Camera Identification.- Data Recovery from Windows CE Based Handheld Devices.- Legal Issues Pertaining to the Use of Cell Phone Data.- Event Data Recorder Forensics.- Protection and Recovery of Railroad Event Recorder Data.- Automobile Event Data Recorder Forensics.- Novel Investigative Techniques.- Reasoning About Evidence Using Bayesian Networks.- Inferring Sources of Leaks in Document Management Systems.- Image Background Matching for Identifying Suspects.- Forensic Tools.- An Evidence Acquisition Tool for Live Systems.- Time Analysis of Hard Drive Imaging Tools.- Fusion of Steganalysis Systems Using Bayesian Model Averaging.- A Virtual Digital Forensics Laboratory.
Themes and Issues.- When is Digital Evidence Forensically Sound?.- Applying Traditional Forensic Taxonomy to Digital Forensics.- Evidence Recovery.- Recovering Data from Failing Floppy Disks.- Extracting Evidence Using Google Desktop Search.- Evaluation of Registry Data Removal by Shredder Programs.- Evidence Integrity.- Using Boot Control to Preserve the Integrity of Evidence.- Hypothesis-Based Investigation of Digital Timestamps.- Improving Disk Sector Integrity Using K-Dimension Hashing.- Evidence Management.- Class-Aware Similarity Hashing for Data Classification.- Applying Topic Modeling to Forensic Data.- Forensic Techniques.- Forensic Analysis of Volatile Instant Messaging.- Timely Rootkit Detection During Live Response.- Network Forensics.- Identifying and Analyzing Web Server Attacks.- Forensic Web Services.- Detecting Remote Exploits Using Data Mining.- Portable Electronic Device Forensics.- Using Sensor Dirt for Toolmark Analysis of Digital Photographs.- A New Feature-Based Method for Source Camera Identification.- Data Recovery from Windows CE Based Handheld Devices.- Legal Issues Pertaining to the Use of Cell Phone Data.- Event Data Recorder Forensics.- Protection and Recovery of Railroad Event Recorder Data.- Automobile Event Data Recorder Forensics.- Novel Investigative Techniques.- Reasoning About Evidence Using Bayesian Networks.- Inferring Sources of Leaks in Document Management Systems.- Image Background Matching for Identifying Suspects.- Forensic Tools.- An Evidence Acquisition Tool for Live Systems.- Time Analysis of Hard Drive Imaging Tools.- Fusion of Steganalysis Systems Using Bayesian Model Averaging.- A Virtual Digital Forensics Laboratory.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826