|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Philip Craiger , Sujeet ShenoiPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of hardcover 1st ed. 2007 Volume: 242 Dimensions: Width: 15.50cm , Height: 1.90cm , Length: 23.50cm Weight: 0.581kg ISBN: 9781441944733ISBN 10: 1441944737 Pages: 357 Publication Date: 08 December 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsLegal Issues.- Calibration Testing Of Network Tap Devices.- On the Legality of Analyzing Telephone Call Records.- Survey of Law Enforcement Perceptions Regarding Digital Evidence.- Insider Threat Detection.- Insider Threat Analysis Using Information-Centric Modeling.- An Integrated System for Insider Threat Detection.- Rootkit Detection.- Analysis of Tools for Detecting Rootkits and Hidden Processes.- A Method for Detecting Linux Kernel Module Rootkits.- Authorship Attribution.- Future Trends in Authorship Attribution.- The Keyboard Dilemma and Authorship Identification.- Forensic Techniques.- Factors Affecting One-Way Hashing of CD-R Media.- Disk Drive I/O Commands and Write Blocking.- A New Process Model for Text String Searching.- Detecting Steganography Using Multi-Class Classification.- Redacting Digital Information from Electronic Devices.- File System Forensics.- In-Place File Carving.- File System Journal Forensics.- Network Forensics.- Using Search Engines to Acquire Network Forensic Evidence.- A Framework for Investigating Railroad Accidents.- Portable Electronic Device Forensics.- Forensic Analysis of Xbox Consoles.- Super-Resolution Video Analysis for Forensic Investigations.- Evidence Analysis and Management.- Specializing CRISP-DM for Evidence Mining.- Applying The Biba Integrity Model to Evidence Management.- Formal Methods.- Investigating Computer Attacks Using Attack Trees.- Attack Patterns: A New Forensic and Design Tool.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |