000 | 03341nam a22005775i 4500 | ||
---|---|---|---|
001 | vtls000544318 | ||
003 | RU-ToGU | ||
005 | 20210922082824.0 | ||
007 | cr nn 008mamaa | ||
008 | 160915s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319142890 _9978-3-319-14289-0 |
||
024 | 7 |
_a10.1007/978-3-319-14289-0 _2doi |
|
035 | _ato000544318 | ||
040 |
_aSpringer _cSpringer _dRU-ToGU |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aDigital Forensics and Cyber Crime _helectronic resource _bFifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers / _cedited by Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili. |
260 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
||
300 |
_aXVI, 253 p. 68 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v132 |
|
505 | 0 | _aDigital Forensics – Technical -- Information Warfare, Cyber Terrorism and Critical Infrastructure Protection -- Digital Forensics - Standards, Certification and Accreditation -- Automation in Digital Forensics. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia. The 16 revised full papers presented together with 2 extended abstracts and 1 poster paper were carefully reviewed and selected from 38 submissions. The papers cover diverse topics in the field of digital forensics and cybercrime, ranging from regulation of social networks to file carving, as well as technical issues, information warfare, cyber terrorism, critical infrastructure protection, standards, certification, accreditation, automation, and digital forensics in the cloud. | ||
650 | 0 |
_aComputer Science. _9155490 |
|
650 | 0 |
_aData protection. _9303937 |
|
650 | 0 |
_aComputer files. _9308771 |
|
650 | 0 |
_aComputers _xLaw and legislation. _9303936 |
|
650 | 0 |
_aInformation systems. _9303226 |
|
650 | 1 | 4 |
_aComputer Science. _9155490 |
650 | 2 | 4 |
_aSystems and Data Security. _9303939 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _9303938 |
650 | 2 | 4 |
_ae-Commerce/e-business. _9413336 |
650 | 2 | 4 |
_aComputers and Society. _9303251 |
650 | 2 | 4 |
_afiles. _9308772 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _9303227 |
700 | 1 |
_aGladyshev, Pavel. _eeditor. _9450917 |
|
700 | 1 |
_aMarrington, Andrew. _eeditor. _9450918 |
|
700 | 1 |
_aBaggili, Ibrahim. _eeditor. _9450919 |
|
710 | 2 |
_aSpringerLink (Online service) _9143950 |
|
773 | 0 | _tSpringer eBooks | |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _9412074 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-14289-0 |
912 | _aZDB-2-SCS | ||
999 | _c401592 |