close
1.

電子ブック

EB
Mark Pollitt, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer US, 2005
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Dealing with Terabyte Data Sets in Digital Investigations / Nicole Beebe ; Jan Clark1:
Forensics and Privacy-Enhancing Technologies / Martin Olivier2:
A Network-Based Architecture for Storing Digital Evidence / Mark Davis ; Gavin Manes ; Sujeet Shenoi3:
Digital Forensics: Meeting the Challenges of Scientific Evidence / Matthew Meyers ; Marcus Rogers4:
Non-Technical Manipulation of Digital Data / Michael Losavio5:
Investigative Techniques / Part II:
Detecting Social Engineering / Michael Hoeschele6:
A Framework for Email Investigations / Anthony Persaud ; Yong Guan7:
The Mitnick Case: How Bayes Could Have Helped / Thomas Duval ; Bernard Jouga ; Laurent Roger8:
Applying Forensic Principles to Computer-Based Assessment / R. Laubscher ; D. Rabe ; M. Olivier ; J. Eloff ; H. Venter9:
Exploring Forensic Data with Self-Organizing Maps / B. Fei10:
Network Forensics / Part III:
Integrating Digital Forensics in Network Infrastructures / Kulesh Shanmugasundaram ; Herve Bronnimann ; Nasir Memon11:
Using Peer-to-Peer Technology for Network Forensics / Scott Redding12:
Forensic Profiling System / P. Kahai ; M. Srinivasan ; K. Namuduri ; R. Pendse13:
Global Internet Routing Forensics / Eunjong Kim ; Dan Massey ; Indrajit Ray14:
Using Signaling Information in Telecom Network Forensics / T. Moore ; A. Meekan ; G. Manes ; S. Shenoi15:
Portable Electronic Device Forensics / Part IV:
Forensic Analysis of Mobile Phone Internal Memory / Svein Willassen16:
Imaging and Analysis of GSM SIM Cards / Christopher Swenson17:
Extracting Concealed Data from BIOS Chips / P. Gershteyn ; M. Davis18:
Linux and File System Forensics / Part V:
Recovering Digital Evidence from Linux Systems / Philip Craiger19:
Detecting Hidden Data in Ext2/Ext3 File Systems / S. Piper20:
Applications and Techniques / Part VI:
Forensic Analysis of Digital Image Tampering / Gilbert Peterson21:
Content-Based Image Retrieval for Digital Forensics / Y. Chen ; V. Roussev ; G. Richard III ; Y. Gao22:
Making Decisions about Legal Responses to Cyber Attacks / L. Peng ; T. Wingfield ; D. Wijesekera ; E. Frye ; R. Jackson ; J. Michael23:
Applying Filter Clusters to Reduce Search State Space / Jill Slay ; Kris Jorgensen24:
In-Kernel Cryptographic Executable Verification / Yusuf Motara ; Barry Irwin25:
Contributing Authors
Preface
Themes and Issues / Part I:
2.

電子ブック

EB
Mark Pollitt, Sujeet Shenoi
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2005
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Dealing with Terabyte Data Sets in Digital Investigations / Nicole Beebe ; Jan Clark1:
Forensics and Privacy-Enhancing Technologies / Martin Olivier2:
A Network-Based Architecture for Storing Digital Evidence / Mark Davis ; Gavin Manes ; Sujeet Shenoi3:
Digital Forensics: Meeting the Challenges of Scientific Evidence / Matthew Meyers ; Marcus Rogers4:
Non-Technical Manipulation of Digital Data / Michael Losavio5:
Investigative Techniques / Part II:
Detecting Social Engineering / Michael Hoeschele6:
A Framework for Email Investigations / Anthony Persaud ; Yong Guan7:
The Mitnick Case: How Bayes Could Have Helped / Thomas Duval ; Bernard Jouga ; Laurent Roger8:
Applying Forensic Principles to Computer-Based Assessment / R. Laubscher ; D. Rabe ; M. Olivier ; J. Eloff ; H. Venter9:
Exploring Forensic Data with Self-Organizing Maps / B. Fei10:
Network Forensics / Part III:
Integrating Digital Forensics in Network Infrastructures / Kulesh Shanmugasundaram ; Herve Bronnimann ; Nasir Memon11:
Using Peer-to-Peer Technology for Network Forensics / Scott Redding12:
Forensic Profiling System / P. Kahai ; M. Srinivasan ; K. Namuduri ; R. Pendse13:
Global Internet Routing Forensics / Eunjong Kim ; Dan Massey ; Indrajit Ray14:
Using Signaling Information in Telecom Network Forensics / T. Moore ; A. Meekan ; G. Manes ; S. Shenoi15:
Portable Electronic Device Forensics / Part IV:
Forensic Analysis of Mobile Phone Internal Memory / Svein Willassen16:
Imaging and Analysis of GSM SIM Cards / Christopher Swenson17:
Extracting Concealed Data from BIOS Chips / P. Gershteyn ; M. Davis18:
Linux and File System Forensics / Part V:
Recovering Digital Evidence from Linux Systems / Philip Craiger19:
Detecting Hidden Data in Ext2/Ext3 File Systems / S. Piper20:
Applications and Techniques / Part VI:
Forensic Analysis of Digital Image Tampering / Gilbert Peterson21:
Content-Based Image Retrieval for Digital Forensics / Y. Chen ; V. Roussev ; G. Richard III ; Y. Gao22:
Making Decisions about Legal Responses to Cyber Attacks / L. Peng ; T. Wingfield ; D. Wijesekera ; E. Frye ; R. Jackson ; J. Michael23:
Applying Filter Clusters to Reduce Search State Space / Jill Slay ; Kris Jorgensen24:
In-Kernel Cryptographic Executable Verification / Yusuf Motara ; Barry Irwin25:
Contributing Authors
Preface
Themes and Issues / Part I:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼