LEADER 04126nam 22008535 450 001 9910298992303321 005 20251226204207.0 010 $a3-319-14289-5 024 7 $a10.1007/978-3-319-14289-0 035 $a(CKB)3710000000325045 035 $a(SSID)ssj0001408030 035 $a(PQKBManifestationID)11967308 035 $a(PQKBTitleCode)TC0001408030 035 $a(PQKBWorkID)11339422 035 $a(PQKB)11474939 035 $a(DE-He213)978-3-319-14289-0 035 $a(MiAaPQ)EBC5586877 035 $a(PPN)183153987 035 $a(EXLCZ)993710000000325045 100 $a20141222d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital Forensics and Cyber Crime $eFifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers /$fedited by Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVI, 253 p. 68 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v132 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-14288-7 327 $aDigital Forensics ? Technical -- Information Warfare, Cyber Terrorism and Critical Infrastructure Protection -- Digital Forensics - Standards, Certification and Accreditation -- Automation in Digital Forensics. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia. The 16 revised full papers presented together with 2 extended abstracts and 1 poster paper were carefully reviewed and selected from 38 submissions. The papers cover diverse topics in the field of digital forensics and cybercrime, ranging from regulation of social networks to file carving, as well as technical issues, information warfare, cyber terrorism, critical infrastructure protection, standards, certification, accreditation, automation, and digital forensics in the cloud. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v132 606 $aData protection 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aElectronic commerce 606 $aComputers and civilization 606 $aData structures (Computer science) 606 $aInformation theory 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $ae-Commerce and e-Business 606 $aComputers and Society 606 $aData Structures and Information Theory 606 $aIT Operations 615 0$aData protection. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aElectronic commerce. 615 0$aComputers and civilization. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$ae-Commerce and e-Business. 615 24$aComputers and Society. 615 24$aData Structures and Information Theory. 615 24$aIT Operations. 676 $a005.8 702 $aGladyshev$b Pavel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMarrington$b Andrew$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBaggili$b Ibrahim$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298992303321 996 $aDigital Forensics and Cyber Crime$92022607 997 $aUNINA