Advances in Digital Forensics II (eBook)
XVIII, 364 Seiten
Springer US (Verlag)
978-0-387-36891-7 (ISBN)
Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:
Themes and Issues in Digital Forensics
Evidence Collecting and Handling
Forensic Techniques
Operating System and File System Forensics
Network Forensics
Portable Electronic Device Forensics
Linux and File System Forensics
Training, Governance and Legal Issues
This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006.
Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa.
Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.
For more information about IFIP, please visit www.ifip.org.
Themes and Issues.- Some Challenges in Digital Forensics.- Evidence Collection and Handling.- Advanced Forensic Format: an Open Extensible Format for Disk Imaging.- File System Support for Digital Evidence Bags.- Remote Upload of Evidence over Mobile Ad Hoc Networks.- Applying Machine Trust Models to Forensic Investigations.- Exploring Big Haystacks.- Forensic Techniques.- Countering Hostile Forensic Techniques.- Using PLSI-U To Detect Insider Threats from Email Traffic.- Collusion Detection Using Multimedia Fingerprints.- Authorship Attribution for Electronic Documents.- Linking Individuals to Digital Information.- Use-Misuse Case Driven Analysis of Positive Train Control.- Operating System and File System Forensics.- Mac OS X Forensics.- Detecting Data Concealment Programs Using Passive File System Analysis.- Assessing Trace Evidence Left by Secure Deletion Programs.- Network Forensics.- On the Reliability of Network Eavesdropping Tools.- Active Traffic Capture for Network Forensics.- Logical Traffic Isolation Using Differentiated Services.- Passive Detection of Nat Routers and Client Counting.- Analysis of Web Proxy Logs.- GSM Cell Site Porensics.- An Architecture for SCADA Network Forensics.- Portable Electronic Device Forensics.- Identifying Digital Cameras Using CFA Interpolation.- Forensic Analysis of BIOS Chips.- Training, Governance and Legal Issues.- A Training Tool for Internet Crimes Against Children Cases.- Process Flow Diagrams for Training and Operations.- A Control Framework for Digital Forensics.- Criminal Regulation of Anti-Forensic Tools in Japan.
Erscheint lt. Verlag | 2.4.2010 |
---|---|
Reihe/Serie | IFIP Advances in Information and Communication Technology | IFIP International Federation for Information Processing |
Verlagsort | Boston |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Anti-Forensic Tools • BIOS Chips • CFA Interpolation • computer crime • Data Concealment • Data Mining • Disk Imaging • Evidence • Forensic • knowledge management • Management • Multimedia • Processing • Router • security • Traffic |
ISBN-10 | 0-387-36891-4 / 0387368914 |
ISBN-13 | 978-0-387-36891-7 / 9780387368917 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich