Digital forensics and cyber crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2015]
|
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
157 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (X, 217 Seiten, 57 illus) |
ISBN: | 9783319255125 |
ISSN: | 1867-8211 |
DOI: | 10.1007/978-3-319-25512-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209939 | ||
003 | DE-604 | ||
005 | 20160718 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319255125 |c Online |9 978-3-319-25512-5 | ||
024 | 7 | |a 10.1007/978-3-319-25512-5 |2 doi | |
035 | |a (OCoLC)929991817 | ||
035 | |a (DE-599)BVBBV043209939 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
111 | 2 | |a ICDF2C |n 7. |d 2015 |c Seoul |j Verfasser |0 (DE-588)1088579841 |4 aut | |
245 | 1 | 0 | |a Digital forensics and cyber crime |b 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers |c Joshua I. James, Frank Breitinger (eds.) |
264 | 1 | |a Cham |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online Ressource (X, 217 Seiten, 57 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 157 |x 1867-8211 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Computers | |
650 | 4 | |a Law and legislation | |
650 | 4 | |a Management information systems | |
650 | 4 | |a E-commerce | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Legal Aspects of Computing | |
650 | 4 | |a e-Commerce/e-business | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 4 | |a Recht | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Seoul |2 gnd-content | |
700 | 1 | |a James, Joshua I. |4 edt | |
700 | 1 | |a Breitinger, Frank |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-25511-8 |
830 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 157 |w (DE-604)BV041557366 |9 157 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-25512-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633100&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633100&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028633100 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25512-5 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175709740990464 |
---|---|
adam_text | DIGITAL FORENSICS AND CYBER CRIME
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
DIGITAL FORENSICS EDUCATION
COMPUTATIONAL FORENSICS
NETWORK AND CLOUD FORENSICS
COOPERATION IN DIGITAL INVESTIGATIONS
SOCIAL MEDIA INVESTIGATIONS
COMPUTER AND DEVICE FORENSICS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DIGITAL FORENSICS AND CYBER CRIME
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 7TH INTERNATIONAL
CONFERENCE ON DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2015, HELD IN
SEOUL, SOUTH KOREA, IN OCTOBER 2015. THE 14 PAPERS AND 3 ABSTRACTS WERE
SELECTED FROM 40 SUBMISSIONS AND COVER DIVERSE TOPICS RANGING FROM
TACTICS OF CYBER CRIME INVESTIGATIONS TO DIGITAL FORENSIC EDUCATION,
NETWORK FORENSICS, AND INTERNATIONAL COOPERATION IN DIGITAL
INVESTIGATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | James, Joshua I. Breitinger, Frank |
author2_role | edt edt |
author2_variant | j i j ji jij f b fb |
author_corporate | ICDF2C Seoul |
author_corporate_role | aut |
author_facet | James, Joshua I. Breitinger, Frank ICDF2C Seoul |
author_sort | ICDF2C Seoul |
building | Verbundindex |
bvnumber | BV043209939 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)929991817 (DE-599)BVBBV043209939 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-25512-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04261nmm a2200793zcb4500</leader><controlfield tag="001">BV043209939</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160718 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319255125</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-25512-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-25512-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)929991817</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209939</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ICDF2C</subfield><subfield code="n">7.</subfield><subfield code="d">2015</subfield><subfield code="c">Seoul</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1088579841</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital forensics and cyber crime</subfield><subfield code="b">7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers</subfield><subfield code="c">Joshua I. James, Frank Breitinger (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (X, 217 Seiten, 57 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">157</subfield><subfield code="x">1867-8211</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-commerce</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Legal Aspects of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">e-Commerce/e-business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Seoul</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">James, Joshua I.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Breitinger, Frank</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-25511-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">157</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">157</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633100&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633100&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028633100</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25512-5</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Seoul gnd-content |
genre_facet | Konferenzschrift 2015 Seoul |
id | DE-604.BV043209939 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:36Z |
institution | BVB |
institution_GND | (DE-588)1088579841 |
isbn | 9783319255125 |
issn | 1867-8211 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028633100 |
oclc_num | 929991817 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online Ressource (X, 217 Seiten, 57 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
series2 | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spelling | ICDF2C 7. 2015 Seoul Verfasser (DE-588)1088579841 aut Digital forensics and cyber crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers Joshua I. James, Frank Breitinger (eds.) Cham Springer [2015] © 2015 1 Online Ressource (X, 217 Seiten, 57 illus) txt rdacontent c rdamedia cr rdacarrier Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 157 1867-8211 Computer science Computer security Computers and civilization Computers Law and legislation Management information systems E-commerce Computer Science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Management of Computing and Information Systems Informatik Recht (DE-588)1071861417 Konferenzschrift 2015 Seoul gnd-content James, Joshua I. edt Breitinger, Frank edt Erscheint auch als Druckausgabe 978-3-319-25511-8 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 157 (DE-604)BV041557366 157 https://doi.org/10.1007/978-3-319-25512-5 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633100&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633100&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Digital forensics and cyber crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Computer science Computer security Computers and civilization Computers Law and legislation Management information systems E-commerce Computer Science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Management of Computing and Information Systems Informatik Recht |
subject_GND | (DE-588)1071861417 |
title | Digital forensics and cyber crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers |
title_auth | Digital forensics and cyber crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers |
title_exact_search | Digital forensics and cyber crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers |
title_full | Digital forensics and cyber crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers Joshua I. James, Frank Breitinger (eds.) |
title_fullStr | Digital forensics and cyber crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers Joshua I. James, Frank Breitinger (eds.) |
title_full_unstemmed | Digital forensics and cyber crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers Joshua I. James, Frank Breitinger (eds.) |
title_short | Digital forensics and cyber crime |
title_sort | digital forensics and cyber crime 7th international conference icdf2c 2015 seoul south korea october 6 8 2015 revised selected papers |
title_sub | 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015 : revised selected papers |
topic | Computer science Computer security Computers and civilization Computers Law and legislation Management information systems E-commerce Computer Science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Management of Computing and Information Systems Informatik Recht |
topic_facet | Computer science Computer security Computers and civilization Computers Law and legislation Management information systems E-commerce Computer Science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Management of Computing and Information Systems Informatik Recht Konferenzschrift 2015 Seoul |
url | https://doi.org/10.1007/978-3-319-25512-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633100&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633100&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041557366 |
work_keys_str_mv | AT icdf2cseoul digitalforensicsandcybercrime7thinternationalconferenceicdf2c2015seoulsouthkoreaoctober682015revisedselectedpapers AT jamesjoshuai digitalforensicsandcybercrime7thinternationalconferenceicdf2c2015seoulsouthkoreaoctober682015revisedselectedpapers AT breitingerfrank digitalforensicsandcybercrime7thinternationalconferenceicdf2c2015seoulsouthkoreaoctober682015revisedselectedpapers |