top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Combating spyware : H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005
Combating spyware : H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005
Descrizione fisica 1 online resource (iii, 71 p.) : ill
Soggetto topico Spyware (Computer software) - Law and legislation - United States
Computer crimes - United States
Privacy, Right of - United States
Soggetto non controllato Computer crimes
Privacy, right of
Spyware (computer software)
Computer networks
True crime
Law
Computers
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Combating spyware
Record Nr. UNINA-9910693942303321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security : private-sector efforts addressing cyber threats : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection, Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, November 15, 2001
Cyber security : private-sector efforts addressing cyber threats : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection, Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, November 15, 2001
Descrizione fisica 1 online resource (iii, 65 p.)
Soggetto topico Computer security - United States
Database security - United States
Cyberterrorism - United States - Prevention
Computer crimes - United States - Prevention
Soggetto non controllato Computer security
Computer crimes
Computers
True crime
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cyber security
Record Nr. UNINA-9910689403903321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002
Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002
Pubbl/distr/stampa : Washington : U.S. G.P.O.
Descrizione fisica 1 online resource (iii, 70 p.)
Soggetto topico Computer security - United States
Cyberterrorism - United States - Prevention
Computer crimes - United States - Prevention
Soggetto non controllato Computer security
Computer crimes
Computers
True crime
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cyber Security Enhancement Act of 2001
Record Nr. UNINA-9910689741403321
: Washington : U.S. G.P.O.
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security research and development : hearing before the Committee on Science, House of Representatives, One Hundred Eighth Congress, first session, May 14, 2003
Cyber security research and development : hearing before the Committee on Science, House of Representatives, One Hundred Eighth Congress, first session, May 14, 2003
Descrizione fisica 1 online resource (iv, 112 p.)
Soggetto topico Computer security - United States
Cyberterrorism - United States - Prevention
Computer networks - Security measures - United States
Soggetto non controllato Computer security
Computer crimes
Computer networks
Computers
True crime
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cyber security research and development
Record Nr. UNINA-9910689629803321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybercrime : can a small business protect itself? : forum before the Committee on Small Business, United States Senate, One Hundred Sixth Congress, second session, March 9, 2000
Cybercrime : can a small business protect itself? : forum before the Committee on Small Business, United States Senate, One Hundred Sixth Congress, second session, March 9, 2000
Descrizione fisica 1 online resource (68 p.) : ill
Soggetto topico Computer crimes - Economic aspects - United States
Small business - Security measures - United States
Electronic commerce - United States
Soggetto non controllato Computer crimes
Small business
Electronic commerce
True crime
Business & economics
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybercrime
Record Nr. UNINA-9910689321903321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The DHS infrastructure protection division : public-private partnerships to secure critical infrastructures : hearing before the Subcommittee on Infrastructure and Border Security and Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, second session, April 21, 2004
The DHS infrastructure protection division : public-private partnerships to secure critical infrastructures : hearing before the Subcommittee on Infrastructure and Border Security and Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, second session, April 21, 2004
Descrizione fisica 1 online resource (vi, 102 p.)
Soggetto topico Computer security - Government policy - United States
Computer networks - Security measures - Government policy - United States
Public-private sector cooperation - United States
Cyberterrorism - United States - Prevention
Soggetto non controllato United States
Computer networks
Public-private sector cooperation
Computer crimes
Political science
Computers
Business & economics
True crime
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti DHS infrastructure protection division
Record Nr. UNINA-9910693906603321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital forensics : an academic introduction / / edited by Andre Arnes
Digital forensics : an academic introduction / / edited by Andre Arnes
Pubbl/distr/stampa Hoboken, New Jersey ; ; Chichester, England : , : Wiley, , 2018
Descrizione fisica 1 online resource (373 pages) : illustrations, tables
Disciplina 363.25/968
Soggetto non controllato Computer crimes
Computer security
Electronic discovery (Law)
Forensic sciences
Electronic books
ISBN 1-119-26241-0
1-119-26240-2
1-119-26244-5
Classificazione MED030000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Preface List of Figures List of Tables List of Examples List of Definitions List of Abbreviations 1 Introduction 1 1.1 Forensic Science 1 1.2 Digital Forensics 4 1.3 Digital Evidence 7 1.4 Further Reading 9 1.5 Chapter Overview 10 1.6 Comments on Citation And Notation 11 2 The Digital Forensics Process 11 2.1 Introduction 12 2.2 The Identification Phase 16 2.3 The Collection Phase 24 2.4 The Examination Phase 35 2.5 The Analysis Phase 42 2.6 The Presentation Phase 47 2.7 Summary 50 2.8 Exercises 51 3 Cybercrime Law 54 3.1 Introduction 54 3.2 The International Legal Framework of Cybercrime Law 57 3.3 Digital Crime - Substantive Criminal Law 79 3.4 Investigation Methods for Collecting Digital Evidence 99 3.5 International Cooperation in Order to Collect Digital Evidence 113 3.6 Summary 119 3.7 Exercises 120 4 Digital Forensic Readiness 122 4.1 Introduction 122 4.2 Definition 122 4.3 Law Enforcement vs. Enterprise Digital Forensic Readiness 123 4.4 Why? - Rationale for Digital Forensic Readiness 124 4.5 Frameworks, Standards and Methodologies 129 4.6 Becoming "Digital Forensic" Ready 132 4.7 Enterprise Digital Forensic Readiness 133 4.8 Considerations for Law Enforcement 152 4.9 Summary 152 4.10 Exercises 153 5 Computer Forensics 154 5.1 Introduction 154 5.2 Evidence Collection 155 5.3 Examination 160 5.4 Analysis 198 5.5 Summary 201 5.6 Exercises 202 6 Mobile and Embedded Forensics 204 6.1 Introduction 205 6.2 Collection Phase 223 6.3 Examination Phase 260 6.4 Reverse Engineering and Analysis of Applications 281 6.5 Summary 285 6.6 Exercises 286 7 Internet Forensics 288 7.1 Introduction 288 7.2 Computer Networking 289 7.3 Layers of Network Abstraction 290 7.4 The Internet 291 7.5 Tracing Information on The Internet 302 7.6 Collection Phase - Local Acquisition 308 7.7 Collection Phase - Network Acquisition 312 7.8 Collection Phase - Remote Acquisition 314 7.9 Other Considerations 318 7.10 The Examination and Analysis Phases 320 7.11 Summary 326 7.12 Exercises 326 8 Challenges in Digital Forensics 328 8.1 Computational Forensics 328 8.2 Automation and Standardization 331 8.3 Research Agenda 332 8.4 Summary 332 9 Educational Guide 334 9.1 Teacher's Guide 334 9.2 Student´S Guide 335 9.3 Summary 339 About The Authors 340 Index 354.
Record Nr. UNINA-9910270867403321
Hoboken, New Jersey ; ; Chichester, England : , : Wiley, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital forensics : an academic introduction / / edited by Andre Arnes
Digital forensics : an academic introduction / / edited by Andre Arnes
Pubbl/distr/stampa Hoboken, New Jersey ; ; Chichester, England : , : Wiley, , 2018
Descrizione fisica 1 online resource (373 pages) : illustrations, tables
Disciplina 363.25/968
Soggetto non controllato Computer crimes
Computer security
Electronic discovery (Law)
Forensic sciences
Electronic books
ISBN 1-119-26241-0
1-119-26240-2
1-119-26244-5
Classificazione MED030000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Preface List of Figures List of Tables List of Examples List of Definitions List of Abbreviations 1 Introduction 1 1.1 Forensic Science 1 1.2 Digital Forensics 4 1.3 Digital Evidence 7 1.4 Further Reading 9 1.5 Chapter Overview 10 1.6 Comments on Citation And Notation 11 2 The Digital Forensics Process 11 2.1 Introduction 12 2.2 The Identification Phase 16 2.3 The Collection Phase 24 2.4 The Examination Phase 35 2.5 The Analysis Phase 42 2.6 The Presentation Phase 47 2.7 Summary 50 2.8 Exercises 51 3 Cybercrime Law 54 3.1 Introduction 54 3.2 The International Legal Framework of Cybercrime Law 57 3.3 Digital Crime - Substantive Criminal Law 79 3.4 Investigation Methods for Collecting Digital Evidence 99 3.5 International Cooperation in Order to Collect Digital Evidence 113 3.6 Summary 119 3.7 Exercises 120 4 Digital Forensic Readiness 122 4.1 Introduction 122 4.2 Definition 122 4.3 Law Enforcement vs. Enterprise Digital Forensic Readiness 123 4.4 Why? - Rationale for Digital Forensic Readiness 124 4.5 Frameworks, Standards and Methodologies 129 4.6 Becoming "Digital Forensic" Ready 132 4.7 Enterprise Digital Forensic Readiness 133 4.8 Considerations for Law Enforcement 152 4.9 Summary 152 4.10 Exercises 153 5 Computer Forensics 154 5.1 Introduction 154 5.2 Evidence Collection 155 5.3 Examination 160 5.4 Analysis 198 5.5 Summary 201 5.6 Exercises 202 6 Mobile and Embedded Forensics 204 6.1 Introduction 205 6.2 Collection Phase 223 6.3 Examination Phase 260 6.4 Reverse Engineering and Analysis of Applications 281 6.5 Summary 285 6.6 Exercises 286 7 Internet Forensics 288 7.1 Introduction 288 7.2 Computer Networking 289 7.3 Layers of Network Abstraction 290 7.4 The Internet 291 7.5 Tracing Information on The Internet 302 7.6 Collection Phase - Local Acquisition 308 7.7 Collection Phase - Network Acquisition 312 7.8 Collection Phase - Remote Acquisition 314 7.9 Other Considerations 318 7.10 The Examination and Analysis Phases 320 7.11 Summary 326 7.12 Exercises 326 8 Challenges in Digital Forensics 328 8.1 Computational Forensics 328 8.2 Automation and Standardization 331 8.3 Research Agenda 332 8.4 Summary 332 9 Educational Guide 334 9.1 Teacher's Guide 334 9.2 Student´S Guide 335 9.3 Summary 339 About The Authors 340 Index 354.
Record Nr. UNINA-9910830954103321
Hoboken, New Jersey ; ; Chichester, England : , : Wiley, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic Communications Privacy Act of 2000, Digital Privacy Act of 2000, and Notice of Electronic Monitoring Act : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 5018, H.R. 4987, and H.R. 4908, September 6, 2000
Electronic Communications Privacy Act of 2000, Digital Privacy Act of 2000, and Notice of Electronic Monitoring Act : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 5018, H.R. 4987, and H.R. 4908, September 6, 2000
Descrizione fisica 1 online resource (iv, 101 p.)
Soggetto topico Telecommunication - Law and legislation - United States
Privacy, Right of - United States
Disclosure of information - Law and legislation - United States
Computer crimes - United States
Eavesdropping - United States
Electronic monitoring in the workplace - Law and legislation - United States
Soggetto non controllato Telecommunication
Privacy, right of
Disclosure of information
Computer crimes
Eavesdropping
Law
Social science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Electronic Communications Privacy Act of 2000, Digital Privacy Act of 2000, and Notice of Electronic Monitoring Act
Record Nr. UNINA-9910689486903321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 29, 2000
Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 29, 2000
Descrizione fisica 1 online resource (iii, 84 p.) : ill
Soggetto topico Computer security - United States
Computer security equipment industry - United States
Computer crimes - United States - Prevention
Cyberterrorism - United States - Prevention
Administrative agencies - Data processing - Security measures - United States
Administrative agencies - Communication systems - Security measures - United States
Data protection - United States
Soggetto non controllato Computer security
Computer crimes
Administrative agencies
Telecommunication systems
Data protection
Computers
True crime
Political science
Technology & engineering
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Enhancing Computer Security
Record Nr. UNINA-9910689468803321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui