This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 14 papers in this volume descibe the various applications of this technology and cover a wide range of topics including law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare.Windows Registry provides a[Key Cells] that contain the timestamp of the most re- cent update to the [Registry] keya . These keysa#39; ... The experiment in this section will be conducted on a Windows XP SP3 computer with Internet Explorer 8.0.6001.18702, all with default settings. ... In order to remove noise (unrelated system calls) generated by other running processes, IE8 was started while recording.
|Title||:||Digital Forensics and Cyber Crime|
|Publisher||:||Springer Science & Business Media - 2011-03-07|