LEADER 04088nam 2200745Ia 450 001 9910457565103321 005 20200520144314.0 010 $a1-283-28387-5 010 $a9786613283870 010 $a0-520-94806-8 024 3 $a9780520948068 035 $a(CKB)2550000000049370 035 $a(EBL)776372 035 $a(OCoLC)755415621 035 $a(SSID)ssj0000640752 035 $a(PQKBManifestationID)11393667 035 $a(PQKBTitleCode)TC0000640752 035 $a(PQKBWorkID)10613753 035 $a(PQKB)11437256 035 $a(MiAaPQ)EBC776372 035 $a(WaSeSS)9780520948068 035 $a(DE-B1597)519547 035 $a(OCoLC)1110707914 035 $a(DE-B1597)9780520948068 035 $a(Au-PeEL)EBL776372 035 $a(CaPaEBR)ebr10502615 035 $a(CaONFJC)MIL328387 035 $a(EXLCZ)992550000000049370 100 $a20100603e20111995 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRoughing it$b[electronic resource] /$fMark Twain ; illustrated by True Williams, Edward F. Mullen, and others ; editors, Harriet Elinor Smith and Edgar Marquess Branch 205 $a3rd ed. 210 $aBerkeley $cUniversity of California Press$d[2011], c1995 215 $a1 online resource (888 p.) 225 1 $aThe Mark Twain library ;$v[8] 300 $aReprint. Originally published: 1995. 300 $a"A publication of the Mark Twain Project of the Bancroft Library". 311 $a0-520-26817-2 320 $aIncludes bibliographical references. 327 $tFrontmatter --$tCONTENTS --$tILLUSTRATIONS --$tFOREWORD --$tPREFATORY --$tCHAPTER 1 --$tCHAPTER 2 --$tCHAPTER 3 --$tCHAPTER 4 --$tCHAPTER 5 --$tCHAPTER 6 --$tCHAPTER 7 --$tCHAPTER 8 --$tCHAPTER 9 --$tCHAPTER 10 --$tCHAPTER 11 --$tCHAPTER 12 --$tCHAPTER 13 --$tCHAPTER 14 --$tCHAPTER 15 --$tCHAPTER 16 --$tCHAPTER 17 --$tCHAPTER 18 --$tCHAPTER 19 --$tCHAPTER 20 --$tCHAPTER 21 --$tCHAPTER 22 --$tCHAPTER 23 --$tCHAPTER 24 --$tCHAPTER 25 --$tCHAPTER 26 --$tCHAPTER 27 --$tCHAPTER 28 --$tCHAPTER 29 --$tCHAPTER 30 --$tCHAPTER 31 --$tCHAPTER 32 --$tCHAPTER 33 --$tCHAPTER 34 --$tCHAPTER 35 --$tCHAPTER 36 --$tCHAPTER 37 --$tCHAPTER 38 --$tCHAPTER 39 --$tCHAPTER 40 --$tCHAPTER 41 --$tCHAPTER 42 --$tCHAPTER 43 --$tCHAPTER 44 --$tCHAPTER 45 330 $aMark Twain's humorous account of his six years in Nevada, San Francisco, and the Sandwich Islands is a patchwork of personal anecdotes and tall tales, many of them told in the "vigorous new vernacular" of the West. Selling seventy five thousand copies within a year of its publication in 1872, Roughing It was greeted as a work of "wild, preposterous invention and sublime exaggeration" whose satiric humor made "pretension and false dignity ridiculous." Meticulously restored from a variety of original sources, the text is the first to adhere to the author's wishes in thousands of details of wording, spelling, and punctuation, and includes all of the 304 first-edition illustrations. With its comprehensive and illuminating notes and supplementary materials, which include detailed maps tracing Mark Twain's western travels, this Mark Twain Library Roughing It must be considered the standard edition for readers and students of Mark Twain. 410 0$aMark Twain Library 606 $aAuthors, American$xHomes and haunts$zWest (U.S.) 607 $aWest (U.S.)$xDescription and travel 607 $aWest (U.S.)$xIntellectual life$y19th century 608 $aElectronic books. 615 0$aAuthors, American$xHomes and haunts 676 $a917.8042 700 $aTwain$b Mark$f1835-1910.$027404 701 $aWilliams$b True$01030001 701 $aMullen$ffl. 1859-1872.$01030002 701 $aSmith$b Harriet Elinor$01030003 701 $aBranch$b Edgar Marquess$f1913-$0784150 712 02$aBancroft Library.$bMark Twain Project. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910457565103321 996 $aRoughing it$92446702 997 $aUNINA LEADER 11133nam 22007575 450 001 9910502594403321 005 20251225180421.0 010 $a3-030-88381-7 024 7 $a10.1007/978-3-030-88381-2 035 $a(CKB)5140000000014219 035 $a(MiAaPQ)EBC6783556 035 $a(Au-PeEL)EBL6783556 035 $a(OCoLC)1277149647 035 $a(DE-He213)978-3-030-88381-2 035 $a(PPN)25829678X 035 $a(EXLCZ)995140000000014219 100 $a20211014d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Digital Forensics XVII $e17th IFIP WG 11.9 International Conference, Virtual Event, February 1?2, 2021, Revised Selected Papers /$fedited by Gilbert Peterson, Sujeet Shenoi 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (268 pages) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v612 311 08$a3-030-88380-9 327 $aIntro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files. 327 $a5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 327 $a4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. 327 $aChapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. 330 $aADVANCES IN DIGITAL FORENSICS XVII Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: · Themes and Issues · Approximate Matching Techniques · Advanced Forensic Techniques · Novel Applications · Image Forensics This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, a fully-remote event held in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v612 606 $aData protection 606 $aMachine learning 606 $aComputer engineering 606 $aComputer networks 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aData and Information Security 606 $aMachine Learning 606 $aComputer Engineering and Networks 606 $aComputer Communication Networks 606 $aLegal Aspects of Computing 615 0$aData protection. 615 0$aMachine learning. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 14$aData and Information Security. 615 24$aMachine Learning. 615 24$aComputer Engineering and Networks. 615 24$aComputer Communication Networks. 615 24$aLegal Aspects of Computing. 676 $a005.8 702 $aPeterson$b Gilbert$f1969- 702 $aShenoi$b Sujeet 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910502594403321 996 $aAdvances in digital forensics XVII$92899385 997 $aUNINA