Cargando…

Handbook of electronic security and digital forensics /

The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Jahankhani, Hamid
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New Jersey : World Scientific, ©2010.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn670429025
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mnu---unuuu
008 101018s2010 njua obf 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OSU  |d YDXCP  |d E7B  |d OCLCQ  |d EBLCP  |d STF  |d OCLCQ  |d UIU  |d OCLCQ  |d OCLCF  |d OCLCQ  |d DEBSZ  |d OCL  |d OCLCQ  |d AGLDB  |d OCLCQ  |d OCLCA  |d VTS  |d CEF  |d M8D  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9789812837042  |q (electronic bk.) 
020 |a 9812837043  |q (electronic bk.) 
020 |z 9789812837035 
020 |z 9812837035 
029 1 |a AU@  |b 000054176297 
029 1 |a DEBBG  |b BV043136611 
029 1 |a DEBSZ  |b 421673974 
029 1 |a DEBSZ  |b 431014450 
029 1 |a DEBSZ  |b 454995601 
035 |a (OCoLC)670429025 
050 4 |a QA76.9.A25  |b H355 2010eb 
072 7 |a BUS  |x 097000  |2 bisacsh 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
082 0 4 |a 658.478  |2 22 
049 |a UAMI 
245 0 0 |a Handbook of electronic security and digital forensics /  |c edited by Hamid Jahankhani [and others]. 
260 |a New Jersey :  |b World Scientific,  |c ©2010. 
300 |a 1 online resource (ix, 697 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a 1. OS and network security / Roberto Di Pietro and Nino Vincenzo Verde -- 2. Authentication / Roberto Di Pietro and Nino Vincenzo Verde -- 3. Classification of attacks on cryptographic protocols / Luca Spalazzi and Simone Tacconi -- 4. Wi-fi security / Sufian Yousef -- 5. Auditing, penetration testing and ethical hacking / Frank Leonhardt -- 6. VoIP security issues / Frank Leonhardt -- 7. Secure by design : considering security from the early stages of the information systems development / Haralambos Mouratidis -- 8. Online transactions' security / James Kadirire -- 9. Security and e-accessibility of online banking / Hamid Jahankhani, Liaqat Ali and Hossein Jahankhani -- 10. Towards an integrated network security framework using the Y-Comm architecture / Glenford Mapp, Jon Crowcroft and Raphael Phan -- 11. Introduction to behavioural biometrics / Kenneth Revett -- 12. Information security management and standards of best practice / Theo Tryfonas -- 13. Security risk management strategy / Hamid Jahankhani, Mathews Z. Nkhoma and Haralambos Mouratidis -- 14. Open source intelligence / David Lilburn Watson -- 15. Digital identity management / Elias Pimenidis -- 16. E-security and critical national infrastructures / Howard Thompson -- 17. Digital forensics techniques and tools / Roberto Di Pietro and Nino Vincenzo Verde -- 18. iPod, cell and smart phone forensics / M. Mattiucci [and others] -- 19. A methodology for smartphones internal memory acquisition, decoding and analysis / Rosamaria Bertè [and others] -- 20. Analysis of e-mail headers / Alessandro Obino and Massimo Bernaschi -- 21. Digital evidence manipulation using anti-forensic tools and techniques / Hamid Jahankhani and Elidon Beqiri -- 22. Hidden data and steganography / David Lilburn Watson -- 23. Cyberspace and cybercrime / Vagelis Papakonstantinou -- 24. Intellectual property rights : the security perspective / Vagelis Papakonstantinou -- 25. Legal issues on the protection of personal data on the internet / Evi Chatziliassi -- 26. Downloading music : legal facts / Hamid Jahankhani and Chris O. Folorunso -- 27. The use of electronic surveillance in conducting criminal investigations on the internet / Murdoch Watney -- 28. The legal conflict between security and privacy in addressing terrorism and other crime on the internet / Murdoch Watney -- 29. Cybercrime / Hamid Jahankhani and Ameer Al-Nemrat -- 30. Cybercrime : innocent victims and their plight for justice / Hamid Jahankhani and Kevin Orme -- 31. Intelligent decision support systems for assistance in forensic investigation processes / Dale Dzemydiene -- 32. Bioinformatics and biometrics / Kenneth Revett -- 33. Criminal data mining / Viktoras Justickis. 
520 |a The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals. This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 0 |a Computer crimes  |x Investigation  |v Handbooks, manuals, etc. 
650 6 |a Sécurité informatique  |v Guides, manuels, etc. 
650 6 |a Criminalité informatique  |x Enquêtes  |v Guides, manuels, etc. 
650 7 |a BUSINESS & ECONOMICS  |x Workplace Culture.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Governance.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Leadership.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Development.  |2 bisacsh 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer security  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
700 1 |a Jahankhani, Hamid. 
776 0 8 |i Print version:  |t Handbook of electronic security and digital forensics.  |d Singapore ; Hackensack, NJ : World Scientific, ©2010  |z 9789812837035  |w (OCoLC)607941206 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=340765  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24686168 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL731080 
938 |a ebrary  |b EBRY  |n ebr10422305 
938 |a EBSCOhost  |b EBSC  |n 340765 
938 |a YBP Library Services  |b YANK  |n 3511356 
994 |a 92  |b IZTAP