Computer Forensic

Journal title SICUREZZA E SCIENZE SOCIALI
Author/s Lorenzo Angioni
Publishing Year 2018 Issue 2017/3
Language Italian Pages 11 P. 99-109 File size 202 KB
DOI 10.3280/SISS2017-003009
DOI is like a bar code for intellectual property: to have more infomation click here

Below, you can see the article first page

If you want to buy this article in PDF format, you can do it, following the instructions to buy download credits

Article preview

FrancoAngeli is member of Publishers International Linking Association, Inc (PILA), a not-for-profit association which run the CrossRef service enabling links to and from online scholarly content.

This brief work reflects the technologies and the criminalities that the investigation of the scientific police has developed and uses for the search of the data, it pays particular attention to that, the need for technological development, created, that is, the search of data personal, becoming a mobile signal in a system that can expand into a large multimedia and globalized area. We will therefore briefly examine the techniques of research and retrieval of digital data and the development of modern methods of investigation: Digital Forensic. Computer Forensic, devoted to research and analysis of digital data on hardware, Network Forensic, which deals with networks for which digital data is moving and anti-forensic techniques, aimed at countering digital investigation.

Keywords: Cybercrime; cybercop; computerforensic; capability.

  1. AA. VV. (2005). Inside Attack, tecniche d’intervento e strategie di prevenzione. Roma: Nuovo studio tecnica s.r.l.
  2. AA. VV. (2008). Dizionario di informatica. Cles (TN): Microsoft Press.
  3. Angioni M. (2006). Nozioni pratiche di repertamento. Roma: Il Cigno G.G.
  4. Angioni M., Fratoni F. (2015). Scena del crimine e indagini difensive. Milano: Franco Angeli.
  5. Ayers R., Brothers S., & Jansen W. (2014). Guidelines on Mobile Device Forensics - Revision 1. Gaithersburg, MD, USA: National Institute of Standards and Technology U.S. Department of Commerce.
  6. Casey E., a cura di (2011). Handbook of digital forensics and investigation. Burlington, MA, USA: Academic Press - Elsevier.
  7. Chirizzi L. (2009). Computer forensic la ricerca della fonte di prova informatica. Roma: Laurus Robuffo.
  8. Daniel L.E., Daniel L.E. (2012). Digital Forensics for Legal Professionals. Walt-man, MA, USA: Syngress - Elsevier.
  9. Farmer D., Venema W. (2000). Forensic computer analysis: an introduction, re-constructing past events. U.S.A.: Dr. Dobb’s journal.
  10. Farmer D., Venema W. (2005). Forensic discovery. U.S.A.: Addison-Wesley.
  11. Forensics Guidelines of NIST SP 800-Rev.1: 2014 and ISO/IEC 27037:20123. World Congress on Internet Security (WorldCIS-2014) (p. 66-73). Piscataway: IEEE.
  12. Garfinkel S., Spafford G., Schwartz A. (2003). Practical Unix & Internet Security. U.S.A.: O’Reilly Media.
  13. Ghirardini A., Faggioli G. (2013). Digital forensic. Milano: Apogeo.
  14. Maras M.H. (2014). Computer forensic. U.S.A.: Jones and Bartlett Pubblishers.
  15. Walden I. (2016). Computer Crimes and Digital Investigations. Inghilterra: OUP Oxford.

Lorenzo Angioni, Computer Forensic in "SICUREZZA E SCIENZE SOCIALI" 3/2017, pp 99-109, DOI: 10.3280/SISS2017-003009