Welcome
user_choices_background_image
Welcome
login container bottom
Search Library Catalog
Duplicate Items
Add to My List

Print
Request
Sorts and Limits


Title: Digital Forensics and Cyber Crime Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers / edited by Pavel Gladyshev, Marcus K. Rogers.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,

Main Entry: Gladyshev, Pavel. editor.
Rogers, Marcus K. editor.
SpringerLink (Online service)

Publisher: Springer Berlin Heidelberg : Imprint: Springer,
Publication Date: 2012.
Publication Place: Berlin, Heidelberg :
ISBN: 9783642355158
Subject: Computer science.
Computer network architectures.
Data protection.
Computer files.
Information systems.
Computer science.
Systems and Data Security.
e-Commerce/e-business.
Computers and Society.
Management of Computing and Information Systems.
Computer System Implementation.
Files.

Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 88
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 88

Contents: The Role of Perception in Age Estimation -- Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers -- Law Enforcement 2.0: Regulating the Lawful Interception of Social Media -- All Bot Net: A Need for Smartphone P2P Awareness -- Results of Field Testing Mobile Phone Shielding Devices -- Windows Phone 7 from a Digital Forensics’ Perspective -- Forensic Extractions of Data from the Nokia N900 -- A Strategy for Testing Metadata Based Deleted File Recovery Tools -- Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus -- A Novel Methodology for Malware Intrusion Attack Path Reconstruction -- Performance Issues about Context-Triggered Piecewise Hashing -- Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment -- Yahoo! Messenger Forensics on Windows Vista and Windows 7 -- Finding Forensic Information on Creating a Folder in $LogFile of NTFS -- Evaluating the Forensic Image Generator Generator.
Related Records: Springer eBooks
Printed edition: 9783642355141

Cover Image: http://images.amazon.com/images/P/9783642355158.jpg

Results 1 - 1 of 1
  Agency: Collection: Item Type: Status: Barcode: Media Type:
JUST Main Library Electronic Resources No Circulation Available Online -637598 Book