000 | 03268nam a22004815i 4500 | ||
---|---|---|---|
001 | 978-3-031-02351-4 | ||
003 | DE-He213 | ||
005 | 20240730163911.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2017 sz | s |||| 0|eng d | ||
020 |
_a9783031023514 _9978-3-031-02351-4 |
||
024 | 7 |
_a10.1007/978-3-031-02351-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aRoussev, Vassil. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981118 |
|
245 | 1 | 0 |
_aDigital Forensic Science _h[electronic resource] : _bIssues, Methods, and Challenges / _cby Vassil Roussev. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aXIII, 141 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aIntroduction -- Brief History -- Definitions and Models -- System Analysis -- Artifact Analysis -- Open Issues and Challenges -- Bibliography -- Author's Biography . | |
520 | _aDigital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts. Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complexity of IT systems, leading to more complex behavior that needs to be investigated. The goal of this book is to provide a systematic technical overview of digital forensic techniques, primarily from the point of view of computer science. This allows us to put the field in the broader perspective of a host of related areas and gain better insight into the computational challenges facing forensics, as well as draw inspiration for addressing them. This is needed as some of the challenges faced by digital forensics, such as cloud computing, require qualitatively different approaches; the sheer volume of data to be examined also requires new means of processing it. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
710 | 2 |
_aSpringerLink (Online service) _981119 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012235 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034794 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _981120 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02351-4 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85109 _d85109 |