|
Showing 1 - 3 of
3 matches in All Departments
|
Digital Forensics and Cyber Crime - Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili
|
R2,777
Discovery Miles 27 770
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-conference
proceedings of the 5th International ICST Conference on Digital
Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in
Moscow, Russia. The 16 revised full papers presented together with
2 extended abstracts and 1 poster paper were carefully reviewed and
selected from 38 submissions. The papers cover diverse topics in
the field of digital forensics and cybercrime, ranging from
regulation of social networks to file carving, as well as technical
issues, information warfare, cyber terrorism, critical
infrastructure protection, standards, certification, accreditation,
automation and digital forensics in the cloud.
Advances in mobile computing have provided numerous innovations
that make people's daily lives easier and more convenient. However,
as technology becomes more ubiquitous, corresponding risks increase
as well. Managing Security Issues and the Hidden Dangers of
Wearable Technologies examines the positive and negative
ramifications of emerging wearable devices and their potential
threats to individuals, as well as organizations. Highlighting
socio-ethical issues, policy implementation, and appropriate usage,
this book is a pivotal reference source for professionals, policy
makers, academics, managers, and students interested in the
security and privacy implications of wearable digital devices.
Computer forensics is the process of gathering and analyzing
evidence from computer systems to aid in the investigation of a
crime. Typically, such investigations are undertaken by trained
forensic examiners using purpose-built software to discover
evidence from a computer disk. This process is a manual one, and
the time it takes for a forensic examiner to conduct such an
investigation is proportional to the storage capacity of the
computer's disk drives. The heterogeneity and complexity of various
data formats stored on modern computer systems compounds the
problems posed by the sheer volume of data. The decision to
undertake a digital forensic examination of a computer system is a
decision to commit significant quantities of a human examiner's
time. Where there is no prior knowledge of the information
contained on a computer system, this commitment of time and energy
occurs with little idea of the potential benefit to the
investigation.
|
|