Digital Forensics and Cyber Crime : Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engin

個数:

Digital Forensics and Cyber Crime : Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engin

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 297 p.
  • 言語 ENG
  • 商品コード 9783642355141
  • DDC分類 003.3

Full Description

This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.

Contents

The Role of Perception in Age Estimation.- Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers.- Law Enforcement 2.0: Regulating the Lawful Interception of Social Media.- All Bot Net: A Need for Smartphone P2P Awareness.- Results of Field Testing Mobile Phone Shielding Devices.- Windows Phone 7 from a Digital Forensics' Perspective.- Forensic Extractions of Data from the Nokia N900.- A Strategy for Testing Metadata Based Deleted File Recovery Tools.- Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus.- A Novel Methodology for Malware Intrusion Attack Path Reconstruction.- Performance Issues about Context-Triggered Piecewise Hashing.- Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.- Yahoo! Messenger Forensics on Windows Vista and Windows 7.- Finding Forensic Information on Creating a Folder in $LogFile of NTFS.- Evaluating the Forensic Image Generator Generator.

最近チェックした商品