|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn670429025 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mnu---unuuu |
008 |
101018s2010 njua obf 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OSU
|d YDXCP
|d E7B
|d OCLCQ
|d EBLCP
|d STF
|d OCLCQ
|d UIU
|d OCLCQ
|d OCLCF
|d OCLCQ
|d DEBSZ
|d OCL
|d OCLCQ
|d AGLDB
|d OCLCQ
|d OCLCA
|d VTS
|d CEF
|d M8D
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9789812837042
|q (electronic bk.)
|
020 |
|
|
|a 9812837043
|q (electronic bk.)
|
020 |
|
|
|z 9789812837035
|
020 |
|
|
|z 9812837035
|
029 |
1 |
|
|a AU@
|b 000054176297
|
029 |
1 |
|
|a DEBBG
|b BV043136611
|
029 |
1 |
|
|a DEBSZ
|b 421673974
|
029 |
1 |
|
|a DEBSZ
|b 431014450
|
029 |
1 |
|
|a DEBSZ
|b 454995601
|
035 |
|
|
|a (OCoLC)670429025
|
050 |
|
4 |
|a QA76.9.A25
|b H355 2010eb
|
072 |
|
7 |
|a BUS
|x 097000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 104000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 071000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 103000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.478
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Handbook of electronic security and digital forensics /
|c edited by Hamid Jahankhani [and others].
|
260 |
|
|
|a New Jersey :
|b World Scientific,
|c ©2010.
|
300 |
|
|
|a 1 online resource (ix, 697 pages) :
|b illustrations (some color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a 1. OS and network security / Roberto Di Pietro and Nino Vincenzo Verde -- 2. Authentication / Roberto Di Pietro and Nino Vincenzo Verde -- 3. Classification of attacks on cryptographic protocols / Luca Spalazzi and Simone Tacconi -- 4. Wi-fi security / Sufian Yousef -- 5. Auditing, penetration testing and ethical hacking / Frank Leonhardt -- 6. VoIP security issues / Frank Leonhardt -- 7. Secure by design : considering security from the early stages of the information systems development / Haralambos Mouratidis -- 8. Online transactions' security / James Kadirire -- 9. Security and e-accessibility of online banking / Hamid Jahankhani, Liaqat Ali and Hossein Jahankhani -- 10. Towards an integrated network security framework using the Y-Comm architecture / Glenford Mapp, Jon Crowcroft and Raphael Phan -- 11. Introduction to behavioural biometrics / Kenneth Revett -- 12. Information security management and standards of best practice / Theo Tryfonas -- 13. Security risk management strategy / Hamid Jahankhani, Mathews Z. Nkhoma and Haralambos Mouratidis -- 14. Open source intelligence / David Lilburn Watson -- 15. Digital identity management / Elias Pimenidis -- 16. E-security and critical national infrastructures / Howard Thompson -- 17. Digital forensics techniques and tools / Roberto Di Pietro and Nino Vincenzo Verde -- 18. iPod, cell and smart phone forensics / M. Mattiucci [and others] -- 19. A methodology for smartphones internal memory acquisition, decoding and analysis / Rosamaria Bertè [and others] -- 20. Analysis of e-mail headers / Alessandro Obino and Massimo Bernaschi -- 21. Digital evidence manipulation using anti-forensic tools and techniques / Hamid Jahankhani and Elidon Beqiri -- 22. Hidden data and steganography / David Lilburn Watson -- 23. Cyberspace and cybercrime / Vagelis Papakonstantinou -- 24. Intellectual property rights : the security perspective / Vagelis Papakonstantinou -- 25. Legal issues on the protection of personal data on the internet / Evi Chatziliassi -- 26. Downloading music : legal facts / Hamid Jahankhani and Chris O. Folorunso -- 27. The use of electronic surveillance in conducting criminal investigations on the internet / Murdoch Watney -- 28. The legal conflict between security and privacy in addressing terrorism and other crime on the internet / Murdoch Watney -- 29. Cybercrime / Hamid Jahankhani and Ameer Al-Nemrat -- 30. Cybercrime : innocent victims and their plight for justice / Hamid Jahankhani and Kevin Orme -- 31. Intelligent decision support systems for assistance in forensic investigation processes / Dale Dzemydiene -- 32. Bioinformatics and biometrics / Kenneth Revett -- 33. Criminal data mining / Viktoras Justickis.
|
520 |
|
|
|a The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals. This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Computer crimes
|x Investigation
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Sécurité informatique
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes
|v Guides, manuels, etc.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Workplace Culture.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Corporate Governance.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Leadership.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Development.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
700 |
1 |
|
|a Jahankhani, Hamid.
|
776 |
0 |
8 |
|i Print version:
|t Handbook of electronic security and digital forensics.
|d Singapore ; Hackensack, NJ : World Scientific, ©2010
|z 9789812837035
|w (OCoLC)607941206
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=340765
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24686168
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL731080
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10422305
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 340765
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3511356
|
994 |
|
|
|a 92
|b IZTAP
|