Handbook of research on computational forensics, digital crime, and investigation : methods and solutions /

Other Authors: Li, Chang-tsun
Format: Book
Language:English
Published: Hershey, PA : Information Science Reference, c2010.
Subjects:
LEADER 02341nam a2200229 a 4500
001 553604
005 20171111230018.0
008 090608s2010 paua b 001 0 eng
020 |a 9781605668369 (hardcover) 
040 |a DLC 
050 |a HV6773  |b .H374 2010 
082 |2 22  |a 363.250285 
245 |a Handbook of research on computational forensics, digital crime, and investigation :  |b methods and solutions /  |c [edited by] Chang-Tsun Li. 
260 |a Hershey, PA :  |b Information Science Reference,  |c c2010. 
300 |a xxiii, 595 p. :  |b ill. ;  |c 29 cm. 
504 |a Includes bibliographical references and index. 
505 |a Ch. 1. Privacy Enhancing Technologies in Biometrics -- Ch. 2. Fingerprint Forensic Tool for Criminal Investigations -- Ch. 3. Principles and Methods for Face Recognition and Face Modelling -- Ch. 4. Biometrical Processing of Faces in Security and Forensics -- Ch. 5. Digital Camera Photographic Provenance -- Ch. 6. Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication -- Ch. 7. Challenges and Solutions in Multimedia Document Authentication -- Ch. 8. Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications -- Ch. 9. Novel Multilevel DCT Based Reversible Data Hiding -- Ch. 10. Massively Threaded Digital Forensics Tools -- Ch. 11. Testing Digital Forensic Software Tools Used in Expert Testimony -- Ch. 12. Network Forensics: A Practical Introduction -- Ch. 13. Novel Intrusion Detection System for Smart Space -- Ch. 14. Deception Detection on the Internet -- Ch. 15. Forensic Investigation of Peer-to-Peer Networks -- Ch. 16. Identity Theft through the Web -- Ch. 17. Embedded Forensics: An Ongoing Research about SIM/USIM Cards -- Ch. 18. Forensic Implications of Virtualization Technologies -- Ch. 19. Conceptual Tools for Dealing with Narrative Terrorism Information -- Ch. 20. Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process -- Ch. 21. Legal Issues for Research and Practice in Computational Forensics -- Ch. 22. Trends in Information Security Regulation. 
650 |a Computer crimes 
650 |a Computer crimes  |x Prevention 
650 |a Forensic sciences 
700 1 |a Li, Chang-tsun 
952 |a GrThPMO  |b 59b016026c5ad17d7e5ad9c4  |c 952a  |d 9528  |e HV6773.H374 2010  |t 7  |x m  |z Books