Centro de Documentação da PJ
Monografia

CD268
CRAIGER, Philip, ed.
Advances in digital forensics III [Documento electrónico] : IFIP International Conference on Digital Forensics / ed. Philip Craiger, ed. Sujeet Shenoi.- New York : Springer, 2007.- 1 CD-ROM ; 12 cm. - (International Federation for Information Processing)
Ficheiro de 19,2 MB em formato PDF (355 p.).
ISBN 978-0-387-73741-6


INFORMÁTICA FORENSE, INTERCEPÇÃO DAS COMUNICAÇÕES, PROVA DIGITAL, REDE INFORMÁTICA, INTERNET, TELEFONE MÓVEL, SISTEMA OPERATIVO

Part I. Legal issues. 1. Calibration Testing of Network Tap Devices. 2. On the Legality of Analyzing Telephone Call Records. 3. Survey of Law Enforcement Perceptions Regarding Digital Evidence. Part II. Insider threat detection. 4. Insider Threat Analysis Using Information-Centric Modeling. 5. An Integrated System for Insider Threat Detection. Part III. Rootkit detection. 6. Analysis of Tools for Detecting Rootkits and Hidden Processes. 7. A Method for Detecting Linux Kernel Module Rootkits. Part IV. Authorship attribution. 8. Future Trends in Authorship Attribution. 9. The Keyboard Dilemma and Authorship Identification. Part V. Forensic techniques. 10. Factors Affecting One-Way Hashing of CD-R Media. 11. Disk Drive I/O Commands and Write Blocking. 12. A New Process Model for Text String Searching. 13. Detecting Steganography Using Multi-Class Classification. 14. Redacting Digital Information from Electronic Devices. Part VI. File system forensics. 15. In-Place File Carving. 16. File System Journal Forensics. Part VII. Network forensics. 17.Using Search Engines to Acquire Network Forensic Evidence. 18. A Framework for Investigating Railroad Accidents. Part VIII. Portable electronic device forensics. 19. Forensic Analysis of Xbox Consoles. 20. Super-Resolution Video Analysis for Forensic Investigations. Part IX. Evidence analysis and management. 21. Specializing CRISP-DM for Evidence Mining. 22. Applying the Biba Integrity Model to Evidence Management. Part X. Formal methods. 23. Investigating Computer Attacks Using Attack Trees. 24. Attack Patterns: A New Forensic and Design Tool.