In the past half-century we have gone from a world where computers were science fiction to a world where computers are everyday fact. Just thirty years ago the computer that flew with the first astronauts to the moon had less computing power than the computer on the average student’s desk today. Computers have grown in popularity,...
The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...
The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.
Before the invention of the Internet and the creation of the Web, the vast majority of human
conversations were in spoken form, with the only notable, but extremely limited, exception being
epistolary exchanges. Some important spoken conversations, such as criminal trials and political
debates (e.g., Hansard, the transcripts of...
The rapid advance of technology has changed and influenced how we think about gathering digital
evidence. Soon after the attacks on the World Trade Center in New York City on September 11,
2001, many young men and women volunteered to serve their country in different ways. For those
who did not choose the military, options included...
Up until the mid-1950s President Dwight D. Eisenhower believed that waging all-out war against an enemy
threatening to end your national existence was right, natural, and necessary. In the wake of World War Two
this was hardly a controversial position, as memories of Munich, Pearl Harbor, and Adolf Hitler had made the
notion of just...
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help...
The Android mobile platform has quickly risen from its first phone in October 2008
to the most popular mobile operating system in the world by early 2011. The
explosive growth of the platform has been a significant win for consumers with
respect to competition and features. However, forensic analysts and security engineers
have...
One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.
The real question is who is this book for. This book is...
The Safety-critical Systems Symposium (SSS), held each February for seventeen
consecutive years, offers a full-day tutorial followed by two days of presentations
of papers. This book of Proceedings contains all the papers presented at SSS’09.
The first paper accompanies the tutorial, which addresses one of the...