000 -LEADER |
fixed length control field |
05604nam a2200649 i 4500 |
001 - CONTROL NUMBER |
control field |
7809443 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200413152923.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
170125s2017 caua foab 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781627054652 |
Qualifying information |
ebook |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781627059596 |
Qualifying information |
print |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.2200/S00738ED1V01Y201610SPT019 |
Source of number or code |
doi |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl00407070 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)970007308 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV8073 |
Item number |
.R683 2017 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.25 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Roussev, Vassil, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Digital forensic science : |
Remainder of title |
issues, methods, and challenges / |
Statement of responsibility, etc. |
Vassil Roussev. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
[San Rafael, California] : |
Name of producer, publisher, distributor, manufacturer |
Morgan & Claypool, |
Date of production, publication, distribution, manufacture, or copyright notice |
2017. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 PDF (xiii, 141 pages) : |
Other physical details |
illustrations. |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
electronic |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Synthesis lectures on information security, privacy, and trust, |
International Standard Serial Number |
1945-9750 ; |
Volume/sequential designation |
# 19 |
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat Reader. |
500 ## - GENERAL NOTE |
General note |
Part of: Synthesis digital library of engineering and computer science. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 125-140). |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction -- 1.1 Scope of this book -- 1.2 Organization -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
2. Brief history -- 2.1 Early years (1984-1996) -- 2.2 Golden age (1997-2007) -- 2.3 Present (2007-) -- 2.4 Summary -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
3. Definitions and models -- 3.1 The Daubert standard -- 3.2 Digital forensic science definitions -- 3.2.1 Law-centric definitions -- 3.2.2 Working technical definition -- 3.3 Models of forensic analysis -- 3.3.1 Differential analysis -- 3.3.2 Computer history model -- 3.3.3 Cognitive task model -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
4. System analysis -- 4.1 Storage forensics -- 4.1.1 Data abstraction layers -- 4.1.2 Data acquisition -- 4.1.3 Forensic image formats -- 4.1.4 Filesystem analysis -- 4.1.5 Case study: FAT32 -- 4.1.6 Case study: NTFS -- 4.1.7 Data recovery and file content carving -- 4.1.8 File fragment classification -- 4.2 Main memory forensics -- 4.2.1 Memory acquisition -- 4.2.2 Memory image analysis -- 4.3 Network forensics -- 4.4 Real-time processing and triage -- 4.4.1 Real-time computing -- 4.4.2 Forensic computing with deadlines -- 4.4.3 Triage -- 4.5 Application forensics -- 4.5.1 Web browser -- 4.5.2 Cloud drives -- 4.6 Cloud forensics -- 4.6.1 Cloud basics -- 4.6.2 The cloud forensics landscape -- 4.6.3 IaaS forensics -- 4.6.4 SaaS forensics -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
5. Artifact analysis -- 5.1 Finding known objects: cryptographic hashing -- 5.2 Block-level analysis -- 5.3 Efficient hash representation: Bloom filters -- 5.4 Approximate matching -- 5.4.1 Content-defined data chunks -- 5.4.2 Ssdeep -- 5.4.3 Sdhash -- 5.4.4 Evaluation -- 5.5 Cloud-native artifacts -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
6. Open issues and challenges -- 6.1 Scalability -- 6.2 Visualization and collaboration -- 6.3 Automation and intelligence -- 6.4 Pervasive encryption -- 6.5 Cloud computing -- 6.5.1 From SaaP to SaaS -- 6.5.2 Separating cloud services from their implementation -- 6.5.3 Research challenges -- 6.6 Internet of things (IoT) -- Bibliography -- Author's biography. |
506 1# - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Abstract freely available; full-text restricted to subscribers or individual document purchasers. |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Compendex |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
INSPEC |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google scholar |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google book search |
520 3# - SUMMARY, ETC. |
Summary, etc. |
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts. Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complexity of IT systems, leading to more complex behavior that needs to be investigated. The goal of this book is to provide a systematic technical overview of digital forensic techniques, primarily from the point of view of computer science. This allows us to put the field in the broader perspective of a host of related areas and gain better insight into the computational challenges facing forensics, as well as draw inspiration for addressing them. This is needed as some of the challenges faced by digital forensics, such as cloud computing, require qualitatively different approaches; the sheer volume of data to be examined also requires new means of processing it. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Also available in print. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF title page (viewed on January 24, 2017). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Forensic sciences |
General subdivision |
Data processing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Investigation. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
digital forensics |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cyber forensics |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cyber crime |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
incident response |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
data recovery |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781627059596 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis digital library of engineering and computer science. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis lectures on information security, privacy, and trust ; |
Volume/sequential designation |
# 19. |
International Standard Serial Number |
1945-9750 |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to resource |
Uniform Resource Identifier |
http://ieeexplore.ieee.org/servlet/opac?bknumber=7809443 |