000 | 05604nam a2200649 i 4500 | ||
---|---|---|---|
001 | 7809443 | ||
003 | IEEE | ||
005 | 20200413152923.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 170125s2017 caua foab 000 0 eng d | ||
020 |
_a9781627054652 _qebook |
||
020 |
_z9781627059596 _qprint |
||
024 | 7 |
_a10.2200/S00738ED1V01Y201610SPT019 _2doi |
|
035 | _a(CaBNVSL)swl00407070 | ||
035 | _a(OCoLC)970007308 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aHV8073 _b.R683 2017 |
|
082 | 0 | 4 |
_a363.25 _223 |
100 | 1 |
_aRoussev, Vassil, _eauthor. |
|
245 | 1 | 0 |
_aDigital forensic science : _bissues, methods, and challenges / _cVassil Roussev. |
264 | 1 |
_a[San Rafael, California] : _bMorgan & Claypool, _c2017. |
|
300 |
_a1 PDF (xiii, 141 pages) : _billustrations. |
||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aSynthesis lectures on information security, privacy, and trust, _x1945-9750 ; _v# 19 |
|
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat Reader. | ||
500 | _aPart of: Synthesis digital library of engineering and computer science. | ||
504 | _aIncludes bibliographical references (pages 125-140). | ||
505 | 0 | _a1. Introduction -- 1.1 Scope of this book -- 1.2 Organization -- | |
505 | 8 | _a2. Brief history -- 2.1 Early years (1984-1996) -- 2.2 Golden age (1997-2007) -- 2.3 Present (2007-) -- 2.4 Summary -- | |
505 | 8 | _a3. Definitions and models -- 3.1 The Daubert standard -- 3.2 Digital forensic science definitions -- 3.2.1 Law-centric definitions -- 3.2.2 Working technical definition -- 3.3 Models of forensic analysis -- 3.3.1 Differential analysis -- 3.3.2 Computer history model -- 3.3.3 Cognitive task model -- | |
505 | 8 | _a4. System analysis -- 4.1 Storage forensics -- 4.1.1 Data abstraction layers -- 4.1.2 Data acquisition -- 4.1.3 Forensic image formats -- 4.1.4 Filesystem analysis -- 4.1.5 Case study: FAT32 -- 4.1.6 Case study: NTFS -- 4.1.7 Data recovery and file content carving -- 4.1.8 File fragment classification -- 4.2 Main memory forensics -- 4.2.1 Memory acquisition -- 4.2.2 Memory image analysis -- 4.3 Network forensics -- 4.4 Real-time processing and triage -- 4.4.1 Real-time computing -- 4.4.2 Forensic computing with deadlines -- 4.4.3 Triage -- 4.5 Application forensics -- 4.5.1 Web browser -- 4.5.2 Cloud drives -- 4.6 Cloud forensics -- 4.6.1 Cloud basics -- 4.6.2 The cloud forensics landscape -- 4.6.3 IaaS forensics -- 4.6.4 SaaS forensics -- | |
505 | 8 | _a5. Artifact analysis -- 5.1 Finding known objects: cryptographic hashing -- 5.2 Block-level analysis -- 5.3 Efficient hash representation: Bloom filters -- 5.4 Approximate matching -- 5.4.1 Content-defined data chunks -- 5.4.2 Ssdeep -- 5.4.3 Sdhash -- 5.4.4 Evaluation -- 5.5 Cloud-native artifacts -- | |
505 | 8 | _a6. Open issues and challenges -- 6.1 Scalability -- 6.2 Visualization and collaboration -- 6.3 Automation and intelligence -- 6.4 Pervasive encryption -- 6.5 Cloud computing -- 6.5.1 From SaaP to SaaS -- 6.5.2 Separating cloud services from their implementation -- 6.5.3 Research challenges -- 6.6 Internet of things (IoT) -- Bibliography -- Author's biography. | |
506 | 1 | _aAbstract freely available; full-text restricted to subscribers or individual document purchasers. | |
510 | 0 | _aCompendex | |
510 | 0 | _aINSPEC | |
510 | 0 | _aGoogle scholar | |
510 | 0 | _aGoogle book search | |
520 | 3 | _aDigital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts. Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complexity of IT systems, leading to more complex behavior that needs to be investigated. The goal of this book is to provide a systematic technical overview of digital forensic techniques, primarily from the point of view of computer science. This allows us to put the field in the broader perspective of a host of related areas and gain better insight into the computational challenges facing forensics, as well as draw inspiration for addressing them. This is needed as some of the challenges faced by digital forensics, such as cloud computing, require qualitatively different approaches; the sheer volume of data to be examined also requires new means of processing it. | |
530 | _aAlso available in print. | ||
588 | _aTitle from PDF title page (viewed on January 24, 2017). | ||
650 | 0 |
_aForensic sciences _xData processing. |
|
650 | 0 |
_aComputer crimes _xInvestigation. |
|
653 | _adigital forensics | ||
653 | _acyber forensics | ||
653 | _acyber crime | ||
653 | _aincident response | ||
653 | _adata recovery | ||
776 | 0 | 8 |
_iPrint version: _z9781627059596 |
830 | 0 | _aSynthesis digital library of engineering and computer science. | |
830 | 0 |
_aSynthesis lectures on information security, privacy, and trust ; _v# 19. _x1945-9750 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=7809443 |
999 |
_c562244 _d562244 |