Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham ; Heidelberg ; New York ; Dordrecht ; London
Springer
[2014]
|
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
132 |
Schlagworte: | |
Online-Zugang: | DE-522 DE-634 DE-Aug4 DE-M347 DE-92 DE-859 DE-861 DE-473 DE-355 DE-703 DE-20 DE-29 DE-739 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (XVI, 253 p. 68 illus) |
ISBN: | 9783319142890 |
DOI: | 10.1007/978-3-319-14289-0 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV043209935 | ||
003 | DE-604 | ||
005 | 20160525 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2014 xx o|||| 10||| eng d | ||
020 | |a 9783319142890 |c Online |9 978-3-319-14289-0 | ||
024 | 7 | |a 10.1007/978-3-319-14289-0 |2 doi | |
035 | |a (OCoLC)899178644 | ||
035 | |a (DE-599)BVBBV043209935 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-522 |a DE-Aug4 |a DE-861 |a DE-M347 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a PZ 3250 |0 (DE-625)141166: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Digital Forensics and Cyber Crime |b Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers |c Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili (Eds.) |
264 | 1 | |a Cham ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online Ressource (XVI, 253 p. 68 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 132 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a File organization (Computer science) | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Computers | |
650 | 4 | |a Law and legislation | |
650 | 4 | |a Management information systems | |
650 | 4 | |a E-commerce | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Legal Aspects of Computing | |
650 | 4 | |a e-Commerce/e-business | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Files | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 4 | |a Recht | |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Moskau |2 gnd-content | |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Gladyshev, Pavel |4 edt | |
700 | 1 | |a Marrington, Andrew |4 edt | |
700 | 1 | |a Baggili, Ibrahim |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-14288-3 |
830 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 132 |w (DE-604)BV041557366 |9 132 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-14289-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633096&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633096&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2014 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028633096 | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-522 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14289-0 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1825766768602251264 |
---|---|
adam_text |
DIGITAL FORENSICS AND CYBER CRIME
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
DIGITAL FORENSICS – TECHNICAL
INFORMATION WARFARE, CYBER TERRORISM AND CRITICAL INFRASTRUCTURE
PROTECTION
DIGITAL FORENSICS - STANDARDS, CERTIFICATION AND ACCREDITATION
AUTOMATION IN DIGITAL FORENSICS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DIGITAL FORENSICS AND CYBER CRIME
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 5TH INTERNATIONAL ICST CONFERENCE ON DIGITAL
FORENSICS AND CYBER CRIME, ICDF2C 2013, HELD IN SEPTEMBER 2013 IN
MOSCOW, RUSSIA. THE 16 REVISED FULL PAPERS PRESENTED TOGETHER WITH 2
EXTENDED ABSTRACTS AND 1 POSTER PAPER WERE CAREFULLY REVIEWED AND
SELECTED FROM 38 SUBMISSIONS. THE PAPERS COVER DIVERSE TOPICS IN THE
FIELD OF DIGITAL FORENSICS AND CYBERCRIME, RANGING FROM REGULATION OF
SOCIAL NETWORKS TO FILE CARVING, AS WELL AS TECHNICAL ISSUES,
INFORMATION WARFARE, CYBER TERRORISM, CRITICAL INFRASTRUCTURE
PROTECTION, STANDARDS, CERTIFICATION, ACCREDITATION, AUTOMATION, AND
DIGITAL FORENSICS IN THE CLOUD
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author2 | Gladyshev, Pavel Marrington, Andrew Baggili, Ibrahim |
author2_role | edt edt edt |
author2_variant | p g pg a m am i b ib |
author_facet | Gladyshev, Pavel Marrington, Andrew Baggili, Ibrahim |
building | Verbundindex |
bvnumber | BV043209935 |
classification_rvk | PZ 3250 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)899178644 (DE-599)BVBBV043209935 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik |
doi_str_mv | 10.1007/978-3-319-14289-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV043209935</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160525</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2014 xx o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319142890</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-14289-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-14289-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)899178644</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209935</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3250</subfield><subfield code="0">(DE-625)141166:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital Forensics and Cyber Crime</subfield><subfield code="b">Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers</subfield><subfield code="c">Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XVI, 253 p. 68 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">132</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">File organization (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-commerce</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Legal Aspects of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">e-Commerce/e-business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Files</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Moskau</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gladyshev, Pavel</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Marrington, Andrew</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baggili, Ibrahim</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-14288-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">132</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">132</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633096&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633096&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2014</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028633096</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14289-0</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Moskau gnd-content |
genre_facet | Konferenzschrift 2013 Moskau |
id | DE-604.BV043209935 |
illustrated | Not Illustrated |
indexdate | 2025-03-05T15:01:14Z |
institution | BVB |
isbn | 9783319142890 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028633096 |
oclc_num | 899178644 |
open_access_boolean | |
owner | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online Ressource (XVI, 253 p. 68 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
series2 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spelling | Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili (Eds.) Cham ; Heidelberg ; New York ; Dordrecht ; London Springer [2014] © 2014 1 Online Ressource (XVI, 253 p. 68 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 132 Computer science Computer security File organization (Computer science) Computers and civilization Computers Law and legislation Management information systems E-commerce Computer Science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Files Management of Computing and Information Systems Informatik Recht Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Moskau gnd-content Computerforensik (DE-588)4774034-6 s Computerkriminalität (DE-588)4010452-7 s DE-604 Gladyshev, Pavel edt Marrington, Andrew edt Baggili, Ibrahim edt Erscheint auch als Druckausgabe 978-3-319-14288-3 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 132 (DE-604)BV041557366 132 https://doi.org/10.1007/978-3-319-14289-0 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633096&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633096&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Computer science Computer security File organization (Computer science) Computers and civilization Computers Law and legislation Management information systems E-commerce Computer Science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Files Management of Computing and Information Systems Informatik Recht Computerkriminalität (DE-588)4010452-7 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4010452-7 (DE-588)4774034-6 (DE-588)1071861417 |
title | Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers |
title_auth | Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers |
title_exact_search | Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers |
title_full | Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili (Eds.) |
title_fullStr | Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili (Eds.) |
title_full_unstemmed | Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili (Eds.) |
title_short | Digital Forensics and Cyber Crime |
title_sort | digital forensics and cyber crime fifth international conference icdf2c 2013 moscow russia september 26 27 2013 revised selected papers |
title_sub | Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : Revised Selected Papers |
topic | Computer science Computer security File organization (Computer science) Computers and civilization Computers Law and legislation Management information systems E-commerce Computer Science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Files Management of Computing and Information Systems Informatik Recht Computerkriminalität (DE-588)4010452-7 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Computer science Computer security File organization (Computer science) Computers and civilization Computers Law and legislation Management information systems E-commerce Computer Science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Files Management of Computing and Information Systems Informatik Recht Computerkriminalität Computerforensik Konferenzschrift 2013 Moskau |
url | https://doi.org/10.1007/978-3-319-14289-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633096&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633096&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041557366 |
work_keys_str_mv | AT gladyshevpavel digitalforensicsandcybercrimefifthinternationalconferenceicdf2c2013moscowrussiaseptember26272013revisedselectedpapers AT marringtonandrew digitalforensicsandcybercrimefifthinternationalconferenceicdf2c2013moscowrussiaseptember26272013revisedselectedpapers AT baggiliibrahim digitalforensicsandcybercrimefifthinternationalconferenceicdf2c2013moscowrussiaseptember26272013revisedselectedpapers |