|
![]() |
|||
|
||||
OverviewIn 2006, the Federal Bureau of Investigation (FBI) processed more than two petabytes of digital evidence; in 2007, the volume of digital evidence processed will exceed four petabytes. Electronic devices are becoming smaller and more diverse; memory capacities are increasing according to Moore's Law; distributed networks are growing massively in size and scale. As society embraces new technologies and applications with gusto, digital information will become even more pervasive. Digital investigations already involve searching for the proverbial nee dle in the haystack. In five years, possibly sooner, investigators will have to find the one needle in unimaginably large stacks of needles. How will the FBI approach digital investigations of the future? How will state and local law enforcement agents cope? Digital forensics - the scientific discipline focused on the acquisition, preservation, examination, analysis and presentation of digital evidence - will have to provide solutions. The digital forensics research com munity must initiate serious eff'orts to develop the next generation of algorithms, procedures and tools that will be desperately needed. This book. Advances in Digital Forensics III^ is the third volume in the annual series produced by the IFIP Working Group 11.9 on Dig ital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging discipHne of digital forensics. The book presents original research results and innovative applications in digital forensics. Full Product DetailsAuthor: Philip Craiger , Sujeet ShenoiPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2007 ed. Volume: 242 Dimensions: Width: 15.50cm , Height: 2.20cm , Length: 23.50cm Weight: 0.727kg ISBN: 9780387737416ISBN 10: 0387737413 Pages: 357 Publication Date: 20 August 2007 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsLegal Issues.- Calibration Testing Of Network Tap Devices.- On the Legality of Analyzing Telephone Call Records.- Survey of Law Enforcement Perceptions Regarding Digital Evidence.- Insider Threat Detection.- Insider Threat Analysis Using Information-Centric Modeling.- An Integrated System for Insider Threat Detection.- Rootkit Detection.- Analysis of Tools for Detecting Rootkits and Hidden Processes.- A Method for Detecting Linux Kernel Module Rootkits.- Authorship Attribution.- Future Trends in Authorship Attribution.- The Keyboard Dilemma and Authorship Identification.- Forensic Techniques.- Factors Affecting One-Way Hashing of CD-R Media.- Disk Drive I/O Commands and Write Blocking.- A New Process Model for Text String Searching.- Detecting Steganography Using Multi-Class Classification.- Redacting Digital Information from Electronic Devices.- File System Forensics.- In-Place File Carving.- File System Journal Forensics.- Network Forensics.- Using Search Engines to Acquire Network Forensic Evidence.- A Framework for Investigating Railroad Accidents.- Portable Electronic Device Forensics.- Forensic Analysis of Xbox Consoles.- Super-Resolution Video Analysis for Forensic Investigations.- Evidence Analysis and Management.- Specializing CRISP-DM for Evidence Mining.- Applying The Biba Integrity Model to Evidence Management.- Formal Methods.- Investigating Computer Attacks Using Attack Trees.- Attack Patterns: A New Forensic and Design Tool.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |