LEADER 05089nam 2200577 450 001 9910158881603321 005 20221206103633.0 010 $a1-62705-465-0 024 7 $a10.2200/S00738ED1V01Y201610SPT019 035 $a(CKB)3710000001011881 035 $a(MiAaPQ)EBC4776539 035 $a(CaBNVSL)swl00407070 035 $a(OCoLC)970007308 035 $a(IEEE)7809443 035 $a(MOCL)201610SPT019 035 $a(EXLCZ)993710000001011881 100 $a20170125h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aDigital forensic science $eissues, methods, and challenges /$fVassil Roussev, University of New Orleans 210 1$a[San Rafael, California] :$cMorgan & Claypool Publishers,$d2017. 210 4$dİ2017 215 $a1 online resource (157 pages) $cillustrations 225 1 $aSynthesis Lectures on Information Security, Privacy, and Trust,$x1945-9750 ;$vNumber 19 300 $aPart of: Synthesis digital library of engineering and computer science. 311 $a1-62705-959-8 320 $aIncludes bibliographical references. 327 $a1. Introduction -- 1.1 Scope of this book -- 1.2 Organization -- 327 $a2. Brief history -- 2.1 Early years (1984-1996) -- 2.2 Golden age (1997-2007) -- 2.3 Present (2007-) -- 2.4 Summary -- 327 $a3. Definitions and models -- 3.1 The Daubert standard -- 3.2 Digital forensic science definitions -- 3.2.1 Law-centric definitions -- 3.2.2 Working technical definition -- 3.3 Models of forensic analysis -- 3.3.1 Differential analysis -- 3.3.2 Computer history model -- 3.3.3 Cognitive task model -- 327 $a4. System analysis -- 4.1 Storage forensics -- 4.1.1 Data abstraction layers -- 4.1.2 Data acquisition -- 4.1.3 Forensic image formats -- 4.1.4 Filesystem analysis -- 4.1.5 Case study: FAT32 -- 4.1.6 Case study: NTFS -- 4.1.7 Data recovery and file content carving -- 4.1.8 File fragment classification -- 4.2 Main memory forensics -- 4.2.1 Memory acquisition -- 4.2.2 Memory image analysis -- 4.3 Network forensics -- 4.4 Real-time processing and triage -- 4.4.1 Real-time computing -- 4.4.2 Forensic computing with deadlines -- 4.4.3 Triage -- 4.5 Application forensics -- 4.5.1 Web browser -- 4.5.2 Cloud drives -- 4.6 Cloud forensics -- 4.6.1 Cloud basics -- 4.6.2 The cloud forensics landscape -- 4.6.3 IaaS forensics -- 4.6.4 SaaS forensics -- 327 $a5. Artifact analysis -- 5.1 Finding known objects: cryptographic hashing -- 5.2 Block-level analysis -- 5.3 Efficient hash representation: Bloom filters -- 5.4 Approximate matching -- 5.4.1 Content-defined data chunks -- 5.4.2 Ssdeep -- 5.4.3 Sdhash -- 5.4.4 Evaluation -- 5.5 Cloud-native artifacts -- 327 $a6. Open issues and challenges -- 6.1 Scalability -- 6.2 Visualization and collaboration -- 6.3 Automation and intelligence -- 6.4 Pervasive encryption -- 6.5 Cloud computing -- 6.5.1 From SaaP to SaaS -- 6.5.2 Separating cloud services from their implementation -- 6.5.3 Research challenges -- 6.6 Internet of things (IoT) -- Bibliography -- Author's biography. 330 3 $aDigital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts. Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complexity of IT systems, leading to more complex behavior that needs to be investigated. The goal of this book is to provide a systematic technical overview of digital forensic techniques, primarily from the point of view of computer science. This allows us to put the field in the broader perspective of a host of related areas and gain better insight into the computational challenges facing forensics, as well as draw inspiration for addressing them. This is needed as some of the challenges faced by digital forensics, such as cloud computing, require qualitatively different approaches; the sheer volume of data to be examined also requires new means of processing it. 410 0$aSynthesis lectures on information security, privacy and trust ;$vNumber 19. 606 $aComputer crimes$xInvestigation 606 $aData recovery (Computer science) 615 0$aComputer crimes$xInvestigation. 615 0$aData recovery (Computer science) 676 $a363.25968 700 $aRoussev$b Vassil$01265127 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910158881603321 996 $aDigital forensic science$92966642 997 $aUNINA LEADER 04190nam 2200865 450 001 996209567903316 005 20230607215443.0 010 $a1-78170-029-X 010 $a1-280-73429-9 010 $a9786610734290 010 $a1-84779-054-2 010 $a1-4175-9055-6 035 $a(CKB)1000000000030932 035 $a(EBL)242625 035 $a(OCoLC)666981004 035 $a(SSID)ssj0000241068 035 $a(PQKBManifestationID)11219012 035 $a(PQKBTitleCode)TC0000241068 035 $a(PQKBWorkID)10267051 035 $a(PQKB)10048452 035 $a(StDuBDS)EDZ0000085745 035 $a(Au-PeEL)EBL242625 035 $a(CaPaEBR)ebr10078506 035 $a(CaONFJC)MIL73429 035 $a(OCoLC)567959248 035 $a(MiAaPQ)EBC242625 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/38726 035 $a(EXLCZ)991000000000030932 100 $a20031112d2002 uy 0 101 0 $aeng 135 $aurmn#---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSamuel Beckett and the primacy of love /$fJohn Robert Keller 210 $cManchester University Press$d2002 210 1$aManchester ;$aNew York :$cManchester University Press,$d2002. 210 4$dİ2002 215 $a1 online resource (x, 226 pages) $cdigital, PDF file(s) 300 $aDescription based upon print version of record. 300 $aFirst published: 2002. 311 08$aPrinted version: 0719063124 320 $aIncludes bibliographical references (p. [219]-224) and index. 327 $aAcknowledgements --Foreword --Introduction --1. Preliminaries and Proust --2. No Endon sight: Murphy's misrecognition of love --3. This emptied heart: Watt's unwelcome home --4. A strange situation: self-entrapment in Waiting for Godot --5. The dispeopled kingdom: the hidden self in Beckett's short fiction --Epilogue --References --Index. 330 $aThis study considers the fundamental literary value and the underlying psychological meaning of Beckett's work. John Keller explores the central place of the emotional world in Beckett's writing, believing the texts embody a struggle to remain in contact with a primal sense of internal goodness. 330 $aThis study is about the central place of the emotional world in Beckett's writing. Stating that Beckett is 'primarily about love', Dr. Keller makes a radical re-assessment of his influence and immense popularity. The book examines numerous Beckettian texts, arguing that they embody a struggle to remain in contact with a primal sense of internal goodness, one founded on early experience with the mother. Writing itself becomes an internal dialogue, in which the reader is engaged, between a 'narrative-self' and a mother. Keller suggests that this is Beckett's greatest accomplishment as an artist: to document a universal struggle that allows for the birth of the mind, and to connect this struggle to the origin, and possibility of the creative act. This study integrates highly readable discussions of psychoanalytic theory, as well as clinical examples. It will be of value to scholars and readers of Beckett, and anyone interested in his place in literature and culture. 606 $aLove in literature 606 $aPsychoanalysis and literature$zFrance 606 $aPsychoanalysis and literature$zIreland 610 $aliterature 610 $atheatre 610 $abeckett 610 $adrama 610 $aAnxiety 610 $aEndon 610 $aEstragon 610 $aMarcel Proust 610 $aPsychic 610 $aPsychoanalysis 610 $aRage (emotion) 610 $aSamuel Beckett 610 $aSchizoid personality disorder 610 $aWaiting for Godot 615 0$aLove in literature. 615 0$aPsychoanalysis and literature 615 0$aPsychoanalysis and literature 676 $a848/.91409 700 $aKeller$b John Robert$0950921 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996209567903316 996 $aSamuel Beckett and the primacy of love$92149846 997 $aUNISA