LEADER 01102nam0 22003011i 450 001 UON00399644 005 20231205104650.426 010 $a978-88-317-0679-7 100 $a20111108d2011 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aˆGli ‰Ismailiti$estoria di una comunità musulmana$fFarhad Daftary 205 $a1 ed 210 $aVenezia$cMarsilio$d2011 215 $a310 p.$d22 cm 500 1$3UON00401198$aˆA ‰short history of the Ismailis$937850 606 $aISMAILITI$xStoria$3UONC018939$2FI 620 $aIT$dVenezia$3UONL000039 676 $a297.822$cISMAILITI$v21 700 1$aDAFTARY$bFarhad$3UONV042847$0659333 712 $aMarsilio$3UONV246600$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00399644 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI ARA Afr VII D 067 $eSI AA 30900 5 067 $sTesto d'esame 996 $aShort history of the Ismailis$937850 997 $aUNIOR LEADER 04520nam 22006975 450 001 9910299293703321 005 20251225201939.0 010 $a3-319-73697-3 024 7 $a10.1007/978-3-319-73697-6 035 $a(CKB)4100000001794995 035 $a(DE-He213)978-3-319-73697-6 035 $a(MiAaPQ)EBC6283636 035 $a(MiAaPQ)EBC5588805 035 $a(Au-PeEL)EBL5588805 035 $a(OCoLC)1021187949 035 $a(PPN)223956244 035 $a(EXLCZ)994100000001794995 100 $a20180105d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Cyber Crime $e9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /$fedited by Petr Matou?ek, Martin Schmiedecker 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (X, 235 p. 83 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v216 311 08$a3-319-73696-5 320 $aIncludes bibliographical references and index. 327 $aFindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud -- Real-time Forensics through Endpoint Visibility -- Locky ransomware, Al Capone and Brexit Deanonymization -- Finding and Rating Personal Names on Drives for Forensic Needs -- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness -- Open Source Forensics for a Multi-platform Drone System -- A Novel File Carving Algorithm for EVTX Logs -- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence -- Cyber Crime Investigation and Digital Forensics Triage -- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector -- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph --  Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees -- Approxis: a fast, robust, lightweight and approximate Disassembler considered inthe field of memory forensics -- Memory Forensics and the Macintosh OS X Operating System -- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation -- An Overview of the Usage of Default Passwords Hacking -- Automation of MitM Attack on Wi-Fi Networks -- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle -- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets. 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v216 606 $aData protection 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $aComputers and Society 606 $aIT Operations 615 0$aData protection. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aIT Operations. 676 $a363.25968 702 $aMatou?ek$b Petr$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSchmiedecker$b Martin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299293703321 996 $aDigital Forensics and Cyber Crime$92022607 997 $aUNINA