LEADER 01357nam 2200373 n 450 001 996387560903316 005 20221108000450.0 035 $a(CKB)1000000000622666 035 $a(EEBO)2248510967 035 $a(UnM)9927517400971 035 $a(EXLCZ)991000000000622666 100 $a19941122d1679 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 00$aThis is a vvarning to all that profess Christianity and others$b[electronic resource]$eTo beware of covetousness, which is idolatry. By G. Fox 210 $a[London? $cs.n.$d1679] 215 $a16 p 300 $aCaption title. 300 $aImprint from Wing; dated at end: The 5th moneth, 1679. 300 $aIdentified on UMI microfilm (Early English books, 1641-1700) reel 1759 as Wing (2nd ed.) F1933A. 300 $aPlace of publication suggested by Wing. 300 $aReproduction of the original: Harvard University Library and Friends' Library (London, England). 330 $aeebo-0080 606 $aChristian ethics$vEarly works to 1800 615 0$aChristian ethics 700 $aFox$b George$f1624-1691.$0793686 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996387560903316 996 $aThis is a vvarning to all that profess Christianity and others$92360761 997 $aUNISA LEADER 04844nam 22007455 450 001 9910574062803321 005 20250219103743.0 010 $a9783031063657 010 $a3031063651 024 7 $a10.1007/978-3-031-06365-7 035 $a(MiAaPQ)EBC7008990 035 $a(Au-PeEL)EBL7008990 035 $a(CKB)23231038400041 035 $aEBL7008990 035 $a(AU-PeEL)EBL7008990 035 $a(PPN)269149422 035 $a(DE-He213)978-3-031-06365-7 035 $a(EXLCZ)9923231038400041 100 $a20220603d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Cyber Crime $e12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings /$fedited by Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (392 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v441 300 $aDescription based upon print version of record. 311 08$aPrint version: Gladyshev, Pavel Digital Forensics and Cyber Crime Cham : Springer International Publishing AG,c2022 9783031063640 320 $aIncludes bibliographical references and index. 327 $aQuantifying Paging on Recoverable Data from Windows User-Space Modules -- Forensic Investigations of Google Meet and Microsoft Teams ? Two Popular Conferencing Tools in the Pandemic -- On Exploring The Sub-Domain of Artificial Intelligence (AI) Model Forensics -- Auto-Parser: Android Auto & Apple CarPlay Forensics -- Find my IoT Device ? An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows -- Accessing secure data on Android through application analysis -- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack -- Cheating sensitive security quantum bit commitment with security distance function -- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework -- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality -- No Pie in The Sky: The Digital Currency Fraud Website Detection -- Understanding the Brains and Brawn of IllicitStreaming App -- Fine-grained Obfuscation Scheme Recognition on Binary Code -- Backdoor Investigation and Incident Response: From Zero to Profit -- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention -- Lightweight On-demand Honeypot Deployment for Cyber Deception -- Parcae: A Blockchain-Based PRF Service for Everyone -- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies -- Understanding the Security of Deepfake Detection. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v441 606 $aArtificial intelligence 606 $aApplication software 606 $aComputers 606 $aComputer networks 606 $aData protection 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aData and Information Security 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aComputers. 615 0$aComputer networks. 615 0$aData protection. 615 14$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 615 24$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 676 $a363.25968 676 $a363.25968 702 $aGladyshev$b Pavel 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910574062803321 996 $aDigital Forensics and Cyber Crime$92022607 997 $aUNINA