Cargando…

EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis /

This book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in the UK. The theme of the conference was the protection of computer networks, with contributions from bo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Blyth, Andrew (Editor ), Sutherland, Iain (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Springer London : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-84628-750-3
003 DE-He213
005 20220116204713.0
007 cr nn 008mamaa
008 100515s2007 xxk| s |||| 0|eng d
020 |a 9781846287503  |9 978-1-84628-750-3 
024 7 |a 10.1007/978-1-84628-750-3  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a EC2ND 2006  |h [electronic resource] :  |b Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis /  |c edited by Andrew Blyth, Iain Sutherland. 
246 3 |a Faculty of Advanced Technology, University of Glamorgan, Wales, UK 
250 |a 1st ed. 2007. 
264 1 |a London :  |b Springer London :  |b Imprint: Springer,  |c 2007. 
300 |a VIII, 125 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Computer Network Defence -- Efficient Sampling of the Structure of Crypto Generators' State Transition Graphs -- Mandatory Access Control applications to web hosting -- Outsourcing Security Services for Low Performance Portable Devices -- Public Verifiable Multi-sender Identity Based Threshold Signcryption -- A Discussion on the Role of Deception in Information Operations for the Defence of Computer Networks -- A New Approach to Understanding Information Assurance -- Robust Public Key Cryptography - A New Cryptosystem Surviving Private Key Compromise -- Digital Forensics & Incident Analysis -- Review of Forensic Tools for Smartphones -- Oscar - Using Byte Pairs to Find File Type and Camera Make of Data Fragments -- An empirical methodology derived from the analysis of information remaining on second hand hard disks -- Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model -- Professionalism in Computer Forensics. 
520 |a This book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in the UK. The theme of the conference was the protection of computer networks, with contributions from both national and international participants reporting on research developments, as well as providing valuable insights in this area. The book also incorporates the proceedings of the First Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), held in conjunction with EC2ND 2006. Topics and issues discussed include: Computer Network Operations Computer Network Attack Network Application Security Network Forensics Web Security Vulnerability Management and Tracking Network Defence Wireless and Mobile Security Cryptography Network Discovery and Mapping Network Security Intrusion Detection Systems Incident Response and Management Computer Forensics Practice Malicious Software Analysis Network Architectures and Management Legal and Ethical Issues The papers presented include contributions from leading figures in the fields of network security and computer forensics, and are a valuable source of reference for both researchers and practitioners. 
650 0 |a Computer networks . 
650 0 |a Electronic data processing-Management. 
650 0 |a Computers-Law and legislation. 
650 0 |a Information technology-Law and legislation. 
650 0 |a Application software. 
650 0 |a Information storage and retrieval systems. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a IT Operations. 
650 2 4 |a Legal Aspects of Computing. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a Information Storage and Retrieval. 
700 1 |a Blyth, Andrew.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Sutherland, Iain.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781846287497 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-84628-750-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)