Welcome
Copyright © SirsiDynix. All rights reserved.
(Build horizon-8.0.1.5407)
University of Jordan
العربية (السعودية)
English (United States)
Log in
Help
Welcome
Catalogue Search
E-Journal Federated Search
Search Library Catalog
Simple
Advanced
Power
Theses
Community Resources
JOPULS
Search History
My List
My Account
Search
Options
Refine
Start Over
Show details
Hide details
Duplicate Items
Add to My List
Print
Request
Sorts and Limits
Sorts:
Author
Publication Date
Publisher
Subject
Title
Title:
Digital Forensics and Cyber Crime Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers / edited by Pavel Gladyshev, Marcus K. Rogers.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Main Entry:
Gladyshev, Pavel. editor.
Rogers, Marcus K. editor.
SpringerLink (Online service)
Publisher:
Springer Berlin Heidelberg : Imprint: Springer,
Publication Date:
2012.
Publication Place:
Berlin, Heidelberg :
ISBN:
9783642355158
Subject:
Computer science.
Computer network architectures.
Data protection.
Computer files.
Information systems.
Computer science.
Systems and Data Security.
e-Commerce/e-business.
Computers and Society.
Management of Computing and Information Systems.
Computer System Implementation.
Files.
Series:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 88
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 88
Contents:
The Role of Perception in Age Estimation -- Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers -- Law Enforcement 2.0: Regulating the Lawful Interception of Social Media -- All Bot Net: A Need for Smartphone P2P Awareness -- Results of Field Testing Mobile Phone Shielding Devices -- Windows Phone 7 from a Digital Forensics’ Perspective -- Forensic Extractions of Data from the Nokia N900 -- A Strategy for Testing Metadata Based Deleted File Recovery Tools -- Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus -- A Novel Methodology for Malware Intrusion Attack Path Reconstruction -- Performance Issues about Context-Triggered Piecewise Hashing -- Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment -- Yahoo! Messenger Forensics on Windows Vista and Windows 7 -- Finding Forensic Information on Creating a Folder in $LogFile of NTFS -- Evaluating the Forensic Image Generator Generator.
Related Records:
Springer eBooks
Printed edition: 9783642355141
Cover Image:
Results 1 - 1 of 1
Agency:
Collection:
Item Type:
Status:
Barcode:
Media Type:
JUST Main Library
Electronic Resources
No Circulation
Available Online
-637598
Book