close
1.

電子ブック

EB
Philip Craiger, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer New York, 2007
所蔵情報: loading…
2.

電子ブック

EB
Indrajit Ray, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
3.

電子ブック

EB
Eric Goetz, Sujeet Shenoi, J?rg Siekmann
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
4.

電子ブック

EB
Martin S. Olivier, M. Knauth, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer US, 2006
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Some Challenges in Digital Forensics / Eugene Spafford1:
Evidence Collection and Handling / Part II:
AFF: An Open Extensible Format for Disk Imaging / S. Garfinkel ; D. Malan ; K. Dubec ; C. Stevens ; C. Pham2:
File System Support for Digital Evidence Bags / Golden Richard III ; Vassil Roussev3:
Remote Upload of Evidence Over Mobile Ad Hoc Networks / Indrajit Ray4:
Applying Machine Trust Models to Forensic Investigations / M. Wojcik ; H. Venter ; J. Eloff ; M. Olivier5:
Exploring Big Haystacks: Data Mining and Knowledge Management / Mark Pollitt ; Anthony Whitledge6:
Forensic Techniques / Part III:
Countering Hostile Forensic Techniques / Scott Piper ; Mark Davis ; Sujeet Shenoi7:
Using PLSI-U to Detect Insider Threats From Email Traffic / James Okolica ; Gilbert Peterson ; Robert Mills8:
Collusion Detection Using Multimedia Fingerprints / Anthony Persaud ; Yong Guan9:
Authorship Attribution for Electronic Documents / Patrick Juola10:
Linking Individuals to Digital Information / Shelly Seier ; David Greer ; Gavin Manes11:
Use-Misuse Case Driven Analysis of Positive Train Control / Mark Hartong ; Rajni Goel ; Duminda Wijesekera12:
Operating System and File System Forensics / Part IV:
Mac OS X Forensics / Philip Craiger ; Paul Burke13:
Detecting Data Concealment Programs Using File System Analysis / M. Davis ; R. Kennedy ; K. Pyles ; A. Strickler ; S. Shenoi14:
Assessing Trace Evidence Left by Secure Deletion Programs / 15:
Network Forensics / Part V:
On the Reliability of Network Eavesdropping Tools / Eric Cronin ; Micah Sherr ; Matthew Blaze16:
Active Traffic Capture for Network Forensics / Marco Slaviero ; Anna Granova ; Martin Olivier17:
Logical Traffic Isolation Using Differentiated Services / Tinus Strauss ; Derrick Kourie18:
Passive Detection of NAT Routers and Client Counting / Kenneth Straka19:
Analysis of Web Proxy Logs / B. Fei20:
GSM Cell Site Forensics / Christopher Swenson ; Tyler Moore21:
An Architecture for SCADA Network Forensics / T. Kilpatrick ; J. Gonzalez ; R. Chandia ; M. Papa22:
Portable Electronic Device Forensics / Part VI:
Identifying Digital Cameras Using CFA Interpolation / Sevinc Bayram ; Husrev Sencar ; Nasir Memon23:
Forensic Analysis of BIOS Chips / Pavel Gershteyn24:
Training, Governance and Legal Issues / Part VII:
A Training Tool for Internet Crimes Against Children Cases / S. Aggarwal ; B. Breeden ; P. Henry ; J. Mulholland25:
Process Flow Diagrams for Training and Operations / Jacobus Venter26:
A Control Framework for Digital Forensics / S. von Solms ; C. Louwrens ; C. Reekie ; T. Grobler27:
Criminal Regulation of Anti-Forensic Tools in Japan / Tetsuya Ishii28:
Contributing Authors
Preface
Themes and Issues / Part I:
5.

電子ブック

EB
Mark Pollitt, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer US, 2005
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Dealing with Terabyte Data Sets in Digital Investigations / Nicole Beebe ; Jan Clark1:
Forensics and Privacy-Enhancing Technologies / Martin Olivier2:
A Network-Based Architecture for Storing Digital Evidence / Mark Davis ; Gavin Manes ; Sujeet Shenoi3:
Digital Forensics: Meeting the Challenges of Scientific Evidence / Matthew Meyers ; Marcus Rogers4:
Non-Technical Manipulation of Digital Data / Michael Losavio5:
Investigative Techniques / Part II:
Detecting Social Engineering / Michael Hoeschele6:
A Framework for Email Investigations / Anthony Persaud ; Yong Guan7:
The Mitnick Case: How Bayes Could Have Helped / Thomas Duval ; Bernard Jouga ; Laurent Roger8:
Applying Forensic Principles to Computer-Based Assessment / R. Laubscher ; D. Rabe ; M. Olivier ; J. Eloff ; H. Venter9:
Exploring Forensic Data with Self-Organizing Maps / B. Fei10:
Network Forensics / Part III:
Integrating Digital Forensics in Network Infrastructures / Kulesh Shanmugasundaram ; Herve Bronnimann ; Nasir Memon11:
Using Peer-to-Peer Technology for Network Forensics / Scott Redding12:
Forensic Profiling System / P. Kahai ; M. Srinivasan ; K. Namuduri ; R. Pendse13:
Global Internet Routing Forensics / Eunjong Kim ; Dan Massey ; Indrajit Ray14:
Using Signaling Information in Telecom Network Forensics / T. Moore ; A. Meekan ; G. Manes ; S. Shenoi15:
Portable Electronic Device Forensics / Part IV:
Forensic Analysis of Mobile Phone Internal Memory / Svein Willassen16:
Imaging and Analysis of GSM SIM Cards / Christopher Swenson17:
Extracting Concealed Data from BIOS Chips / P. Gershteyn ; M. Davis18:
Linux and File System Forensics / Part V:
Recovering Digital Evidence from Linux Systems / Philip Craiger19:
Detecting Hidden Data in Ext2/Ext3 File Systems / S. Piper20:
Applications and Techniques / Part VI:
Forensic Analysis of Digital Image Tampering / Gilbert Peterson21:
Content-Based Image Retrieval for Digital Forensics / Y. Chen ; V. Roussev ; G. Richard III ; Y. Gao22:
Making Decisions about Legal Responses to Cyber Attacks / L. Peng ; T. Wingfield ; D. Wijesekera ; E. Frye ; R. Jackson ; J. Michael23:
Applying Filter Clusters to Reduce Search State Space / Jill Slay ; Kris Jorgensen24:
In-Kernel Cryptographic Executable Verification / Yusuf Motara ; Barry Irwin25:
Contributing Authors
Preface
Themes and Issues / Part I:
6.

電子ブック

EB
Eric Goetz, Sujeet Shenoi, Jörg Siekmann, S. Shenoi
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2008
所蔵情報: loading…
7.

電子ブック

EB
Mark Pollitt, Sujeet Shenoi
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2005
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Dealing with Terabyte Data Sets in Digital Investigations / Nicole Beebe ; Jan Clark1:
Forensics and Privacy-Enhancing Technologies / Martin Olivier2:
A Network-Based Architecture for Storing Digital Evidence / Mark Davis ; Gavin Manes ; Sujeet Shenoi3:
Digital Forensics: Meeting the Challenges of Scientific Evidence / Matthew Meyers ; Marcus Rogers4:
Non-Technical Manipulation of Digital Data / Michael Losavio5:
Investigative Techniques / Part II:
Detecting Social Engineering / Michael Hoeschele6:
A Framework for Email Investigations / Anthony Persaud ; Yong Guan7:
The Mitnick Case: How Bayes Could Have Helped / Thomas Duval ; Bernard Jouga ; Laurent Roger8:
Applying Forensic Principles to Computer-Based Assessment / R. Laubscher ; D. Rabe ; M. Olivier ; J. Eloff ; H. Venter9:
Exploring Forensic Data with Self-Organizing Maps / B. Fei10:
Network Forensics / Part III:
Integrating Digital Forensics in Network Infrastructures / Kulesh Shanmugasundaram ; Herve Bronnimann ; Nasir Memon11:
Using Peer-to-Peer Technology for Network Forensics / Scott Redding12:
Forensic Profiling System / P. Kahai ; M. Srinivasan ; K. Namuduri ; R. Pendse13:
Global Internet Routing Forensics / Eunjong Kim ; Dan Massey ; Indrajit Ray14:
Using Signaling Information in Telecom Network Forensics / T. Moore ; A. Meekan ; G. Manes ; S. Shenoi15:
Portable Electronic Device Forensics / Part IV:
Forensic Analysis of Mobile Phone Internal Memory / Svein Willassen16:
Imaging and Analysis of GSM SIM Cards / Christopher Swenson17:
Extracting Concealed Data from BIOS Chips / P. Gershteyn ; M. Davis18:
Linux and File System Forensics / Part V:
Recovering Digital Evidence from Linux Systems / Philip Craiger19:
Detecting Hidden Data in Ext2/Ext3 File Systems / S. Piper20:
Applications and Techniques / Part VI:
Forensic Analysis of Digital Image Tampering / Gilbert Peterson21:
Content-Based Image Retrieval for Digital Forensics / Y. Chen ; V. Roussev ; G. Richard III ; Y. Gao22:
Making Decisions about Legal Responses to Cyber Attacks / L. Peng ; T. Wingfield ; D. Wijesekera ; E. Frye ; R. Jackson ; J. Michael23:
Applying Filter Clusters to Reduce Search State Space / Jill Slay ; Kris Jorgensen24:
In-Kernel Cryptographic Executable Verification / Yusuf Motara ; Barry Irwin25:
Contributing Authors
Preface
Themes and Issues / Part I:
8.

電子ブック

EB
Martin S. Olivier, M. Knauth, Sujeet Shenoi
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2006
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Some Challenges in Digital Forensics / Eugene Spafford1:
Evidence Collection and Handling / Part II:
AFF: An Open Extensible Format for Disk Imaging / S. Garfinkel ; D. Malan ; K. Dubec ; C. Stevens ; C. Pham2:
File System Support for Digital Evidence Bags / Golden Richard III ; Vassil Roussev3:
Remote Upload of Evidence Over Mobile Ad Hoc Networks / Indrajit Ray4:
Applying Machine Trust Models to Forensic Investigations / M. Wojcik ; H. Venter ; J. Eloff ; M. Olivier5:
Exploring Big Haystacks: Data Mining and Knowledge Management / Mark Pollitt ; Anthony Whitledge6:
Forensic Techniques / Part III:
Countering Hostile Forensic Techniques / Scott Piper ; Mark Davis ; Sujeet Shenoi7:
Using PLSI-U to Detect Insider Threats From Email Traffic / James Okolica ; Gilbert Peterson ; Robert Mills8:
Collusion Detection Using Multimedia Fingerprints / Anthony Persaud ; Yong Guan9:
Authorship Attribution for Electronic Documents / Patrick Juola10:
Linking Individuals to Digital Information / Shelly Seier ; David Greer ; Gavin Manes11:
Use-Misuse Case Driven Analysis of Positive Train Control / Mark Hartong ; Rajni Goel ; Duminda Wijesekera12:
Operating System and File System Forensics / Part IV:
Mac OS X Forensics / Philip Craiger ; Paul Burke13:
Detecting Data Concealment Programs Using File System Analysis / M. Davis ; R. Kennedy ; K. Pyles ; A. Strickler ; S. Shenoi14:
Assessing Trace Evidence Left by Secure Deletion Programs / 15:
Network Forensics / Part V:
On the Reliability of Network Eavesdropping Tools / Eric Cronin ; Micah Sherr ; Matthew Blaze16:
Active Traffic Capture for Network Forensics / Marco Slaviero ; Anna Granova ; Martin Olivier17:
Logical Traffic Isolation Using Differentiated Services / Tinus Strauss ; Derrick Kourie18:
Passive Detection of NAT Routers and Client Counting / Kenneth Straka19:
Analysis of Web Proxy Logs / B. Fei20:
GSM Cell Site Forensics / Christopher Swenson ; Tyler Moore21:
An Architecture for SCADA Network Forensics / T. Kilpatrick ; J. Gonzalez ; R. Chandia ; M. Papa22:
Portable Electronic Device Forensics / Part VI:
Identifying Digital Cameras Using CFA Interpolation / Sevinc Bayram ; Husrev Sencar ; Nasir Memon23:
Forensic Analysis of BIOS Chips / Pavel Gershteyn24:
Training, Governance and Legal Issues / Part VII:
A Training Tool for Internet Crimes Against Children Cases / S. Aggarwal ; B. Breeden ; P. Henry ; J. Mulholland25:
Process Flow Diagrams for Training and Operations / Jacobus Venter26:
A Control Framework for Digital Forensics / S. von Solms ; C. Louwrens ; C. Reekie ; T. Grobler27:
Criminal Regulation of Anti-Forensic Tools in Japan / Tetsuya Ishii28:
Contributing Authors
Preface
Themes and Issues / Part I:
9.

電子ブック

EB
Philip Craiger, Sujeet Shenoi
出版情報: SpringerLink Books - AutoHoldings , Springer New York, 2007
所蔵情報: loading…
10.

電子ブック

EB
Indrajit Ray, Sujeet Shenoi
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2008
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼