000 03957nam a22003855i 4500
001 291991
003 MX-SnUAN
005 20160429154931.0
007 cr nn 008mamaa
008 150903s2007 xxk| o |||| 0|eng d
020 _a9781846287503
_99781846287503
024 7 _a10.1007/9781846287503
_2doi
035 _avtls000343992
039 9 _a201509030357
_bVLOAD
_c201405050300
_dVLOAD
_y201402061245
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.M3
100 1 _aBlyth, Andrew.
_eautor
_9322957
245 1 0 _aEC2ND 2006 :
_bProceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK /
_cby Andrew Blyth, Iain Sutherland.
246 3 _aFaculty of Advanced Technology, University of Glamorgan, Wales, UK
264 1 _aLondon :
_bSpringer London,
_c2007.
300 _aviii, 125 páginas
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
500 _aSpringer eBooks
505 0 _aComputer Network Defence -- Efficient Sampling of the Structure of Crypto Generators’ State Transition Graphs -- Mandatory Access Control applications to web hosting -- Outsourcing Security Services for Low Performance Portable Devices -- Public Verifiable Multi-sender Identity Based Threshold Signcryption -- A Discussion on the Role of Deception in Information Operations for the Defence of Computer Networks -- A New Approach to Understanding Information Assurance -- Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise -- Digital Forensics & Incident Analysis -- Review of Forensic Tools for Smartphones -- Oscar — Using Byte Pairs to Find File Type and Camera Make of Data Fragments -- An empirical methodology derived from the analysis of information remaining on second hand hard disks -- Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model -- Professionalism in Computer Forensics.
520 _aThis book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in the UK. The theme of the conference was the protection of computer networks, with contributions from both national and international participants reporting on research developments, as well as providing valuable insights in this area. The book also incorporates the proceedings of the First Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), held in conjunction with EC2ND 2006. Topics and issues discussed include: Computer Network Operations Computer Network Attack Network Application Security Network Forensics Web Security Vulnerability Management and Tracking Network Defence Wireless and Mobile Security Cryptography Network Discovery and Mapping Network Security Intrusion Detection Systems Incident Response and Management Computer Forensics Practice Malicious Software Analysis Network Architectures and Management Legal and Ethical Issues The papers presented include contributions from leading figures in the fields of network security and computer forensics, and are a valuable source of reference for both researchers and practitioners.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aSutherland, Iain.
_eautor
_9323510
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9781846287497
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-1-84628-750-3
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c291991
_d291991