Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Digital Forensics XII: 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers

Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.  Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations.  Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence.  Digital forensics also has myriad intelligence applications.  Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems.







Advances in Digital Forensics XII describes original research results and innovative applications in the discipline of digital forensics.  In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.  The areas of coverage include: Themes and Issues, Mobile Device Forensics, Network Forensics, Cloud Forensics, Social Media Forensics, Image Forensics, Forensic Techniques, and Forensic Tools.





This book is the twelfth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics.  The book contains a selection of twenty edited papers from the Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2016. 







Advances in Digital Forensics XII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the lawenforcement and intelligence communities.





Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA.





Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
Contributing Authors ix
Preface xvii
PART I THEMES AND ISSUES
1 On a Scientific Theory of Digital Forensics
3(22)
Martin Olivier
2 Data Privacy Perceptions About Digital Forensic Investigations in India
25(22)
Robin Verma
Jayaprakash Govindaraj
Gaurav Gupta
3 A Framework for Assessing the Core Capabilities of a Digital Forensic Organization
47(22)
Ahmed Almarzooqi
Andrew Jones
PART II MOBILE DEVICE FORENSICS
4 Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics
69(20)
Oluwapelumi Aboluwarin
Panagiotis Andriotis
Atsuhiro Takasu
Theo Tryfonas
5 Impact of User Data Privacy Management Controls on Mobile Device Investigations
89(18)
Panagiotis Andriotis
Theo Tryfonas
6 Analyzing Mobile Device Ads to Identify Users
107(20)
Jayaprakash Govindaraj
Robin Verma
Gaurav Gupta
7 A Forensic Methodology for Analyzing Nintendo 3DS Devices
127(20)
Huw Read
Elizabeth Thomas
Iain Sutherland
Konstantinos Xynos
Mikhaila Burgess
PART III NETWORK FORENSICS
8 Reconstructing Interactions with Rich Internet Applications from HTTP Traces
147(18)
Sara Baghbanzadeh
Salman Hooshmand
Gregor Bochmann
Guy-Vincent Jourdan
Seyed Mirtaheri
Muhammad Faheem
Iosif Viorel Onut
9 Reconstructing Tabbed Browser Sessions Using Metadata Associations
165(24)
Sriram Raghavan
S. V. Raghavan
10 A Probabilistic Network Forensic Model for Evidence Analysis
189(24)
Changwei Liu
Anoop Singhal
Duminda Wijesekera
PART IV CLOUD FORENSICS
11 API-Based Forensic Acquisition of Cloud Drives
213(24)
Vassil Roussev
Andres Barreto
Irfan Ahmed
12 The Cloud Storage Ecosystem -- A New Business Model for Internet Piracy?
237(22)
Raymond Chan
Kam-Pui Chow
Vivien Chan
Michael Kwan
PART V SOCIAL MEDIA FORENSICS
13 Windows 8.x Facebook and Twitter Metro App Artifacts
259(22)
Swasti Bhushan Deb
14 Profiling Flash Mob Organizers in Web Discussion Forums
281(16)
Vivien Chan
Kam-Pui Chow
Raymond Chan
PART VI IMAGE FORENSICS
15 Enhancing Image Forgery Detection Using 2-D Cross Products
297(14)
Songpon Teerakanok
Tetsutaro Uehara
16 Forensic Authentication of Bank Checks
311(14)
Rajesh Kumar
Gaurav Gupta
PART VII FORENSIC TECHNIQUES
17 Data Type Classification: Hierarchical Class-to-Type Modeling
325(20)
Nicole Beebe
Lishu Liu
Minghe Sun
18 Secure File Deletion for Solid State Drives
345(20)
Bhupendra Singh
Ravi Saharan
Gaurav Somani
Gaurav Gupta
PART VIII FORENSIC TOOLS
19 A Tool for Volatile Memory Acquisition from Android Devices
365(14)
Haiyu Yang
Jianwei Zhuge
Huiming Liu
Wei Liu
20 Advanced Automated Disk Investigation Toolkit
379
Umit Karabiyik
Sudhir Aggarwal