Digital Forensics and Cyber Crime: third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Heidelberg [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
88 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHM01 FHN01 FKE01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XII, 297 S.) Ill., graph. Darst. |
ISBN: | 9783642355158 |
DOI: | 10.1007/978-3-642-35515-8 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV040673327 | ||
003 | DE-604 | ||
005 | 20140114 | ||
007 | cr|uuu---uuuuu | ||
008 | 130115s2012 |||| o||u| ||||||eng d | ||
020 | |a 9783642355158 |c Online |9 978-3-642-35515-8 | ||
024 | 7 | |a 10.1007/978-3-642-35515-8 |2 doi | |
035 | |a (OCoLC)874246854 | ||
035 | |a (DE-599)HBZTT050418200 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-19 |a DE-Aug4 |a DE-92 |a DE-384 |a DE-355 |a DE-859 |a DE-634 |a DE-739 |a DE-706 | ||
082 | 0 | 4 | |a 005.8 |2 23 |
084 | |a PZ 3250 |0 (DE-625)141166: |2 rvk | ||
245 | 1 | 0 | |a Digital Forensics and Cyber Crime |b third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers |c Pavel Gladyshev ... (Eds.) |
264 | 1 | |a Heidelberg [u.a.] |b Springer |c 2012 | |
300 | |a 1 Online-Ressource (XII, 297 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 88 | |
650 | 4 | |a Informatik | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer files | |
650 | 4 | |a Information Systems | |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Dublin |2 gnd-content | |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Gladyshev, Pavel |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-642-35514-1 |
830 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 88 |w (DE-604)BV041557366 |9 88 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-35515-8 |x Verlag |3 Volltext |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025499846 | ||
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l UBA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35515-8 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804149802098753536 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV040673327 |
classification_rvk | PZ 3250 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)874246854 (DE-599)HBZTT050418200 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik |
doi_str_mv | 10.1007/978-3-642-35515-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03338nmm a2200649 cb4500</leader><controlfield tag="001">BV040673327</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140114 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130115s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642355158</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-35515-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-35515-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874246854</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZTT050418200</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3250</subfield><subfield code="0">(DE-625)141166:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital Forensics and Cyber Crime</subfield><subfield code="b">third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers</subfield><subfield code="c">Pavel Gladyshev ... (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 297 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">88</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer files</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Dublin</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gladyshev, Pavel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-642-35514-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">88</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">88</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025499846</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35515-8</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Dublin gnd-content |
genre_facet | Konferenzschrift 2011 Dublin |
id | DE-604.BV040673327 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:28:49Z |
institution | BVB |
isbn | 9783642355158 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025499846 |
oclc_num | 874246854 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-19 DE-BY-UBM DE-Aug4 DE-92 DE-384 DE-355 DE-BY-UBR DE-859 DE-634 DE-739 DE-706 |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-19 DE-BY-UBM DE-Aug4 DE-92 DE-384 DE-355 DE-BY-UBR DE-859 DE-634 DE-739 DE-706 |
physical | 1 Online-Ressource (XII, 297 S.) Ill., graph. Darst. |
psigel | ZDB-2-SCS |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
series2 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spelling | Digital Forensics and Cyber Crime third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers Pavel Gladyshev ... (Eds.) Heidelberg [u.a.] Springer 2012 1 Online-Ressource (XII, 297 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 88 Informatik Computer science Computer network architectures Data protection Computer files Information Systems Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Dublin gnd-content Computerforensik (DE-588)4774034-6 s Computerkriminalität (DE-588)4010452-7 s DE-604 Gladyshev, Pavel Sonstige oth Erscheint auch als Druckausgabe 978-3-642-35514-1 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 88 (DE-604)BV041557366 88 https://doi.org/10.1007/978-3-642-35515-8 Verlag Volltext |
spellingShingle | Digital Forensics and Cyber Crime third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Informatik Computer science Computer network architectures Data protection Computer files Information Systems Computerkriminalität (DE-588)4010452-7 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4010452-7 (DE-588)4774034-6 (DE-588)1071861417 |
title | Digital Forensics and Cyber Crime third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers |
title_auth | Digital Forensics and Cyber Crime third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers |
title_exact_search | Digital Forensics and Cyber Crime third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers |
title_full | Digital Forensics and Cyber Crime third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers Pavel Gladyshev ... (Eds.) |
title_fullStr | Digital Forensics and Cyber Crime third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers Pavel Gladyshev ... (Eds.) |
title_full_unstemmed | Digital Forensics and Cyber Crime third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers Pavel Gladyshev ... (Eds.) |
title_short | Digital Forensics and Cyber Crime |
title_sort | digital forensics and cyber crime third international icst conference icdf2c 2011 dublin ireland october 26 28 2011 revised selected papers |
title_sub | third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 ;Revised Selected Papers |
topic | Informatik Computer science Computer network architectures Data protection Computer files Information Systems Computerkriminalität (DE-588)4010452-7 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Informatik Computer science Computer network architectures Data protection Computer files Information Systems Computerkriminalität Computerforensik Konferenzschrift 2011 Dublin |
url | https://doi.org/10.1007/978-3-642-35515-8 |
volume_link | (DE-604)BV041557366 |
work_keys_str_mv | AT gladyshevpavel digitalforensicsandcybercrimethirdinternationalicstconferenceicdf2c2011dublinirelandoctober26282011revisedselectedpapers |