Advances in Digital Forensics VII Advances in Digital Forensics VII
IFIP Advances in Information and Communication Technology

Advances in Digital Forensics VII

7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers

    • $99.99
    • $99.99

Publisher Description

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

GENRE
Computers & Internet
RELEASED
2011
October 2
LANGUAGE
EN
English
LENGTH
308
Pages
PUBLISHER
Springer Berlin Heidelberg
SELLER
Springer Nature B.V.
SIZE
5.8
MB

More Books Like This

Digital Forensics and Cyber Crime Digital Forensics and Cyber Crime
2021
Digital Forensics and Cyber Crime Digital Forensics and Cyber Crime
2022
Data Analytics and Decision Support for Cybersecurity Data Analytics and Decision Support for Cybersecurity
2017
International Conference on Security and Privacy in Communication Networks International Conference on Security and Privacy in Communication Networks
2015
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2018
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2016

More Books by Gilbert Peterson & Sujeet Shenoi

National Cyber Summit (NCS) Research Track 2021 National Cyber Summit (NCS) Research Track 2021
2021
Churches In Crisis Churches In Crisis
1981
Advances in Digital Forensics V Advances in Digital Forensics V
2009

Other Books in This Series

Open Source Systems: Grounding Research Open Source Systems: Grounding Research
2011
Critical Infrastructure Protection V Critical Infrastructure Protection V
2011
System Modeling and Optimization System Modeling and Optimization
2014
Trust Management IX Trust Management IX
2015
Information Security Education Across the Curriculum Information Security Education Across the Curriculum
2015
History of Nordic Computing 4 History of Nordic Computing 4
2015