LEADER 05089nam 2200577 450 001 9910158881603321 005 20221206103633.0 010 $a1-62705-465-0 024 7 $a10.2200/S00738ED1V01Y201610SPT019 035 $a(CKB)3710000001011881 035 $a(MiAaPQ)EBC4776539 035 $a(CaBNVSL)swl00407070 035 $a(OCoLC)970007308 035 $a(IEEE)7809443 035 $a(MOCL)201610SPT019 035 $a(EXLCZ)993710000001011881 100 $a20170125h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aDigital forensic science $eissues, methods, and challenges /$fVassil Roussev, University of New Orleans 210 1$a[San Rafael, California] :$cMorgan & Claypool Publishers,$d2017. 210 4$d©2017 215 $a1 online resource (157 pages) $cillustrations 225 1 $aSynthesis Lectures on Information Security, Privacy, and Trust,$x1945-9750 ;$vNumber 19 300 $aPart of: Synthesis digital library of engineering and computer science. 311 $a1-62705-959-8 320 $aIncludes bibliographical references. 327 $a1. Introduction -- 1.1 Scope of this book -- 1.2 Organization -- 327 $a2. Brief history -- 2.1 Early years (1984-1996) -- 2.2 Golden age (1997-2007) -- 2.3 Present (2007-) -- 2.4 Summary -- 327 $a3. Definitions and models -- 3.1 The Daubert standard -- 3.2 Digital forensic science definitions -- 3.2.1 Law-centric definitions -- 3.2.2 Working technical definition -- 3.3 Models of forensic analysis -- 3.3.1 Differential analysis -- 3.3.2 Computer history model -- 3.3.3 Cognitive task model -- 327 $a4. System analysis -- 4.1 Storage forensics -- 4.1.1 Data abstraction layers -- 4.1.2 Data acquisition -- 4.1.3 Forensic image formats -- 4.1.4 Filesystem analysis -- 4.1.5 Case study: FAT32 -- 4.1.6 Case study: NTFS -- 4.1.7 Data recovery and file content carving -- 4.1.8 File fragment classification -- 4.2 Main memory forensics -- 4.2.1 Memory acquisition -- 4.2.2 Memory image analysis -- 4.3 Network forensics -- 4.4 Real-time processing and triage -- 4.4.1 Real-time computing -- 4.4.2 Forensic computing with deadlines -- 4.4.3 Triage -- 4.5 Application forensics -- 4.5.1 Web browser -- 4.5.2 Cloud drives -- 4.6 Cloud forensics -- 4.6.1 Cloud basics -- 4.6.2 The cloud forensics landscape -- 4.6.3 IaaS forensics -- 4.6.4 SaaS forensics -- 327 $a5. Artifact analysis -- 5.1 Finding known objects: cryptographic hashing -- 5.2 Block-level analysis -- 5.3 Efficient hash representation: Bloom filters -- 5.4 Approximate matching -- 5.4.1 Content-defined data chunks -- 5.4.2 Ssdeep -- 5.4.3 Sdhash -- 5.4.4 Evaluation -- 5.5 Cloud-native artifacts -- 327 $a6. Open issues and challenges -- 6.1 Scalability -- 6.2 Visualization and collaboration -- 6.3 Automation and intelligence -- 6.4 Pervasive encryption -- 6.5 Cloud computing -- 6.5.1 From SaaP to SaaS -- 6.5.2 Separating cloud services from their implementation -- 6.5.3 Research challenges -- 6.6 Internet of things (IoT) -- Bibliography -- Author's biography. 330 3 $aDigital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts. Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complexity of IT systems, leading to more complex behavior that needs to be investigated. The goal of this book is to provide a systematic technical overview of digital forensic techniques, primarily from the point of view of computer science. This allows us to put the field in the broader perspective of a host of related areas and gain better insight into the computational challenges facing forensics, as well as draw inspiration for addressing them. This is needed as some of the challenges faced by digital forensics, such as cloud computing, require qualitatively different approaches; the sheer volume of data to be examined also requires new means of processing it. 410 0$aSynthesis lectures on information security, privacy and trust ;$vNumber 19. 606 $aComputer crimes$xInvestigation 606 $aData recovery (Computer science) 615 0$aComputer crimes$xInvestigation. 615 0$aData recovery (Computer science) 676 $a363.25968 700 $aRoussev$b Vassil$01265127 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910158881603321 996 $aDigital forensic science$92966642 997 $aUNINA LEADER 01018nam a2200289 i 4500 001 991000814469707536 005 20020506124602.0 008 960308s1970 fr ||| | fre 035 $ab10133380-39ule_inst 035 $aLE00637287$9ExL 040 $aDip.to Fisica$beng 084 $a53.1.4 084 $a53.3.134 084 $a53.5.2 084 $a53.8.1 100 1 $aKalnin, A.$0461103 245 10$aApplications de la théorie des groupes à la mécanique quantique /$cA. Kalnin, M. Petrachene, E. Trifonov 260 $aParis :$bMasson et Cie,$c1970 300 $a251 p. :$bill. ;$c24 cm 700 1 $aPetrachene, M. 700 1 $aTrifonov, E. 907 $a.b10133380$b02-04-14$c27-06-02 912 $a991000814469707536 945 $aLE006 53.3.13 PET$g1$i2006000096706$lle006$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10156860$z27-06-02 996 $aApplications de la théorie des groupes à la mécanique quantique$9185939 997 $aUNISALENTO 998 $ale006$b01-01-96$cm$da $e-$ffre$gfr $h0$i1 LEADER 02750nam 2200517 450 001 9910819800503321 005 20220521200915.0 010 $a3-96869-148-2 024 7 $a10.31819/9783968691480 035 $a(CKB)4100000011690023 035 $a(MiAaPQ)EBC6435971 035 $a(DE-B1597)576123 035 $a(DE-B1597)9783968691480 035 $a(Au-PeEL)EBL6435971 035 $a(OCoLC)1228037346 035 $a(MiAaPQ)EBC6779487 035 $a(EXLCZ)994100000011690023 100 $a20220521d2020 uy 0 101 0 $aspa 135 $aur||#|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFragmentos del celeste imperio $ela representacio?n de China y su imagen literaria en la Espan?a del siglo XIX /$fSiwen Ning 210 1$aMadrid, Spain :$cIberoamericana Editorial Vervuert,$d[2020] 210 4$d©2020 215 $a1 online resource (384 p.) 225 1 $aLa cuestio?n palpitante. Los siglos XVIII y XIX en Espan?a ;$vol. 32 311 0 $a84-9192-195-8 320 $aIncluye referencias bibliogra?ficas (pa?ginas 363-383). 327 $tFront matter --$tÍndice --$tAgradecimientos --$tIntroducción --$tMarco teórico --$tCapítulo 1 China en la prensa ilustrada (1836-1900) --$tCapítulo 2 Viajes a China: memorias y proyecciones --$tCapítulo 3 Narraciones ficticias inspiradas en China --$tLa China leída, la vista y la imaginada, a modo de conclusión --$tBibliografía 330 $a"Este libro estudia ese complejo proceso de seleccio?n y fragmentacio?n que, mientras presentaba el rostro decadente del imperio oriental, suponi?a tambie?n un espejo para interpretar la propia crisis finisecular de Espan?a. Examina asi? la representacio?n de China que ofrecen la prensa y la narrativa espan?ola en dicha e?poca mediante el ana?lisis de fuentes primarias de tres a?mbitos: la prensa ilustrada, que se considera el campo ma?s fecundo de la reproduccio?n de estereotipos del extranjero y ma?s sensible a las tendencias arti?sticas; los principales libros de viaje a China escritos por diploma?ticos espan?oles y, por u?ltimo, las obras de ficcio?n sobre China o sobre los chinos."--$cPublisher's website. 410 0$aCuestio?n palpitante.$pSiglos XVIII y XIX en Espan?a ;$v. 32. 517 3 $aRepresentacio?n de China y su imagen literaria en la Espan?a del siglo XIX 606 $aEmperors 607 $aChina$y19th century 615 0$aEmperors. 676 $a741.5952 700 $aNing$b Siwen$01427065 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910819800503321 996 $aFragmentos del celeste imperio$93559843 997 $aUNINA