Advances in Digital Forensics III: IFIP International Conference on Digital Forensics , National Center for Forensic Science, Orlando Florida, January 28-January 31, 2007

Author:   Philip Craiger ,  Sujeet Shenoi
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2007
Volume:   242
ISBN:  

9781441944733


Pages:   357
Publication Date:   08 December 2010
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $419.76 Quantity:  
Add to Cart

Share |

Advances in Digital Forensics III: IFIP International Conference on Digital Forensics , National Center for Forensic Science, Orlando Florida, January 28-January 31, 2007


Add your own review!

Overview

Full Product Details

Author:   Philip Craiger ,  Sujeet Shenoi
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2007
Volume:   242
Dimensions:   Width: 15.50cm , Height: 1.90cm , Length: 23.50cm
Weight:   0.581kg
ISBN:  

9781441944733


ISBN 10:   1441944737
Pages:   357
Publication Date:   08 December 2010
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Legal Issues.- Calibration Testing Of Network Tap Devices.- On the Legality of Analyzing Telephone Call Records.- Survey of Law Enforcement Perceptions Regarding Digital Evidence.- Insider Threat Detection.- Insider Threat Analysis Using Information-Centric Modeling.- An Integrated System for Insider Threat Detection.- Rootkit Detection.- Analysis of Tools for Detecting Rootkits and Hidden Processes.- A Method for Detecting Linux Kernel Module Rootkits.- Authorship Attribution.- Future Trends in Authorship Attribution.- The Keyboard Dilemma and Authorship Identification.- Forensic Techniques.- Factors Affecting One-Way Hashing of CD-R Media.- Disk Drive I/O Commands and Write Blocking.- A New Process Model for Text String Searching.- Detecting Steganography Using Multi-Class Classification.- Redacting Digital Information from Electronic Devices.- File System Forensics.- In-Place File Carving.- File System Journal Forensics.- Network Forensics.- Using Search Engines to Acquire Network Forensic Evidence.- A Framework for Investigating Railroad Accidents.- Portable Electronic Device Forensics.- Forensic Analysis of Xbox Consoles.- Super-Resolution Video Analysis for Forensic Investigations.- Evidence Analysis and Management.- Specializing CRISP-DM for Evidence Mining.- Applying The Biba Integrity Model to Evidence Management.- Formal Methods.- Investigating Computer Attacks Using Attack Trees.- Attack Patterns: A New Forensic and Design Tool.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List