|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-14289-0 |
003 |
DE-He213 |
005 |
20220117042825.0 |
007 |
cr nn 008mamaa |
008 |
141222s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319142890
|9 978-3-319-14289-0
|
024 |
7 |
|
|a 10.1007/978-3-319-14289-0
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Digital Forensics and Cyber Crime
|h [electronic resource] :
|b Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers /
|c edited by Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XVI, 253 p. 68 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-822X ;
|v 132
|
505 |
0 |
|
|a Digital Forensics - Technical -- Information Warfare, Cyber Terrorism and Critical Infrastructure Protection -- Digital Forensics - Standards, Certification and Accreditation -- Automation in Digital Forensics.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia. The 16 revised full papers presented together with 2 extended abstracts and 1 poster paper were carefully reviewed and selected from 38 submissions. The papers cover diverse topics in the field of digital forensics and cybercrime, ranging from regulation of social networks to file carving, as well as technical issues, information warfare, cyber terrorism, critical infrastructure protection, standards, certification, accreditation, automation, and digital forensics in the cloud.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers-Law and legislation.
|
650 |
|
0 |
|a Information technology-Law and legislation.
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a IT Operations.
|
700 |
1 |
|
|a Gladyshev, Pavel.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Marrington, Andrew.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Baggili, Ibrahim.
|e editor.
|0 (orcid)0000-0002-9574-9537
|1 https://orcid.org/0000-0002-9574-9537
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319142906
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319142883
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-822X ;
|v 132
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-14289-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|