000742250 000__ 02998cam\a2200589Mi\4500 000742250 001__ 742250 000742250 005__ 20230306141245.0 000742250 006__ m\\\\\o\\d\\\\\\\\ 000742250 007__ cr\nn\nnnunnun 000742250 008__ 151001s2015\\\\sz\a\\\\ob\\\\101\0\eng\d 000742250 020__ $$a9783319255125$$qelectronic book 000742250 020__ $$a3319255126$$qelectronic book 000742250 020__ $$z9783319255118 000742250 020__ $$z3319255118 000742250 0247_ $$a10.1007/978-3-319-25512-5$$2doi 000742250 035__ $$aSP(OCoLC)ocn932169908 000742250 035__ $$aSP(OCoLC)932169908 000742250 040__ $$aNUI$$beng$$erda$$epn$$cNUI$$dOCLCO$$dORU$$dYDXCP$$dGZM$$dCOO$$dGW5XE$$dOCLCO 000742250 049__ $$aISEA 000742250 050_4 $$aQA76.9.A25 000742250 08204 $$a005.8$$223 000742250 1112_ $$aInternational Conference on Digital Forensics and Cyber Crime$$n(7th :$$d2015 :$$cSeoul, South Korea) 000742250 24510 $$aDigital forensics and cyber crime$$h[electronic resource] :$$b7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015, revised selected papers /$$cedited by Joshua I. James, Frank Breitinger. 000742250 2463_ $$aICDF2C 2015 000742250 264_1 $$aCham :$$bSpringer,$$c2015. 000742250 300__ $$a1 online resource (x, 217 pages) :$$billustrations. 000742250 336__ $$atext$$btxt$$2rdacontent 000742250 337__ $$acomputer$$bc$$2rdamedia 000742250 338__ $$aonline resource$$bcr$$2rdacarrier 000742250 347__ $$atext file$$bPDF$$2rda 000742250 4901_ $$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$$x1867-8211 ;$$v157 000742250 504__ $$aIncludes bibliographical references and index. 000742250 5050_ $$aDigital Forensics Education -- Computational Forensics -- Network and Cloud Forensics -- Cooperation in Digital Investigations -- Social Media Investigations -- Computer and Device Forensics. 000742250 506__ $$aAccess limited to authorized users. 000742250 520__ $$aThis book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015. The 14 papers and 3 abstracts were selected from 40 submissions and cover diverse topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and international cooperation in digital investigations. 000742250 650_0 $$aComputer crimes$$xInvestigation$$vCongresses. 000742250 650_0 $$aComputer security$$vCongresses. 000742250 650_0 $$aComputer science. 000742250 650_0 $$aComputer security. 000742250 650_0 $$aComputers and civilization. 000742250 650_0 $$aComputers. 000742250 650_0 $$aLaw and legislation. 000742250 650_0 $$aManagement information systems. 000742250 650_0 $$aElectronic commerce. 000742250 7001_ $$aJames, Joshua I.,$$eeditor. 000742250 7001_ $$aBreitinger, Frank,$$eeditor. 000742250 77608 $$iPrint version:$$z9783319255118 000742250 830_0 $$aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$$v157. 000742250 85280 $$bebk$$hSpringerLink 000742250 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-25512-5$$zOnline Access$$91397441.1 000742250 909CO $$ooai:library.usi.edu:742250$$pGLOBAL_SET 000742250 980__ $$aEBOOK 000742250 980__ $$aBIB 000742250 982__ $$aEbook 000742250 983__ $$aOnline 000742250 994__ $$a92$$bISE