| 000 | 03117cam a22004815i 4500 | ||
|---|---|---|---|
| 001 | 21735527 | ||
| 003 | MYCC | ||
| 005 | 20250707152059.0 | ||
| 006 | m |o d | | ||
| 007 | cr ||||||||||| | ||
| 008 | 180424s2018 si |||| o |||| 0|eng | ||
| 020 | _a9789811077623 | ||
| 020 |
_a9789811077630 _ceBOOK |
||
| 040 |
_aDLC _beng _epn _erda _cDLC _dMYCC |
||
| 082 | 0 | 4 |
_a005.8 _223 |
| 090 | 0 | 0 |
_a005.8 _bQUI 2018 |
| 100 | 1 |
_aQuick, Darren, _eauthor. |
|
| 245 | 1 | 0 |
_aBig Digital Forensic Data : _bVolume 1: Data Reduction Framework and Selective Imaging / _cby Darren Quick, Kim-Kwang Raymond Choo. _nVolume 1 |
| 264 | 1 |
_aSingapore : _bSpringer Singapore : _bImprint: Springer, _c2018. |
|
| 300 |
_axv, 96 p.: _bcol. ill.; _c24cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 490 | 1 |
_aSpringerBriefs on Cyber Security Systems and Networks, _x2522-5561 |
|
| 504 | _aIncludes bibliographical references. | ||
| 505 | 0 | _aChapter 1 Introduction -- Chapter 2 Background and Literature Review -- Chapter 3 Data Reduction and Data Mining Framework -- Chapter 4 Digital Forensic Data Reduction by Selective Imaging -- Chapter 5 Summary of the Framework and DRbSI. | |
| 520 | _aThis book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas. | ||
| 650 | 0 | _aApplication software. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aComputers. | |
| 650 | 0 | _aForensic science. | |
| 650 | 0 | _aLaw and legislation. | |
| 650 | 1 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
| 650 | 2 | 4 |
_aComputer Appl. in Social and Behavioral Sciences. _0https://scigraph.springernature.com/ontologies/product-market-codes/I23028 |
| 650 | 2 | 4 |
_aForensic Science. _0https://scigraph.springernature.com/ontologies/product-market-codes/B23000 |
| 650 | 2 | 4 |
_aInformation Systems Applications (incl. Internet). _0https://scigraph.springernature.com/ontologies/product-market-codes/I18040 |
| 650 | 2 | 4 |
_aLegal Aspects of Computing. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24059 |
| 700 | 1 |
_aChoo, Kim-Kwang Raymond, _eauthor. |
|
| 776 | 0 | 8 |
_iPrinted edition: _z9789811077623 |
| 776 | 0 | 8 |
_iPrinted edition: _z9789811077647 |
| 830 | 0 |
_aSpringerBriefs on Cyber Security Systems and Networks, _x2522-5561 |
|
| 942 |
_2ddc _cBK |
||
| 999 |
_c309 _d309 |
||