| 000 | 03889nam a22005535i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-11534-9 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084531.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642115349 _9978-3-642-11534-9 |
||
| 024 | 7 |
_a10.1007/978-3-642-11534-9 _2doi |
|
| 050 | 4 | _aQA76.9.D343 | |
| 072 | 7 |
_aUNF _2bicssc |
|
| 072 | 7 |
_aUYQE _2bicssc |
|
| 072 | 7 |
_aCOM021030 _2bisacsh |
|
| 082 | 0 | 4 |
_a006.312 _223 |
| 100 | 1 |
_aGoel, Sanjay. _eeditor. |
|
| 245 | 1 | 0 |
_aDigital Forensics and Cyber Crime _h[electronic resource] : _bFirst International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers / _cedited by Sanjay Goel. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXII, 171p. 74 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v31 |
|
| 505 | 0 | _aFull and Short Papers -- Digital Evidence Composition in Fraud Detection -- iForensics: Forensic Analysis of Instant Messaging on Smart Phones -- A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks -- SMIRK: SMS Management and Information Retrieval Kit -- Localization and Detection of Vector Logo Image Plagiarism -- Analysis of Free Download Manager for Forensic Artefacts -- On the Reliability of Cell Phone Camera Fingerprint Recognition -- Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank -- Analysis of Evidence Using Formal Event Reconstruction -- Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations -- Digital Evidence Retrieval and Forensic Analysis on Gambling Machine -- Online Acquisition of Digital Forensic Evidence -- Criminal Defense Challenges in Computer Forensics -- Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance -- A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices -- A Host-Based Approach to BotNet Investigation?. | |
| 520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference, ICDF2C 2009, held September 30 - October 2, 2009, in Albany, NY, USA. Digital forensics and cyber crime is a multidisciplinary area that requires expertise in several areas including law, computer science, finance networking, data mining and criminal justice. The 16 papers present the whole gamut of multimedia and handheld device forensics, financial crimes, cyber crime investigations, forensics and law, cyber security and information warfare. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData mining. | |
| 650 | 0 | _aComputer vision. | |
| 650 | 0 | _aBiometrics. | |
| 650 | 0 |
_aComputers _xLaw and legislation. |
|
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
| 650 | 2 | 4 | _aComputers and Society. |
| 650 | 2 | 4 | _aLegal Aspects of Computing. |
| 650 | 2 | 4 | _aBiometrics. |
| 650 | 2 | 4 | _aComputer Imaging, Vision, Pattern Recognition and Graphics. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642115332 |
| 830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v31 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-11534-9 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c111875 _d111875 |
||