|
|
|
|
LEADER |
02341nam a2200229 a 4500 |
001 |
553604 |
005 |
20171111230018.0 |
008 |
090608s2010 paua b 001 0 eng |
020 |
|
|
|a 9781605668369 (hardcover)
|
040 |
|
|
|a DLC
|
050 |
|
|
|a HV6773
|b .H374 2010
|
082 |
|
|
|2 22
|a 363.250285
|
245 |
|
|
|a Handbook of research on computational forensics, digital crime, and investigation :
|b methods and solutions /
|c [edited by] Chang-Tsun Li.
|
260 |
|
|
|a Hershey, PA :
|b Information Science Reference,
|c c2010.
|
300 |
|
|
|a xxiii, 595 p. :
|b ill. ;
|c 29 cm.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
|
|
|a Ch. 1. Privacy Enhancing Technologies in Biometrics -- Ch. 2. Fingerprint Forensic Tool for Criminal Investigations -- Ch. 3. Principles and Methods for Face Recognition and Face Modelling -- Ch. 4. Biometrical Processing of Faces in Security and Forensics -- Ch. 5. Digital Camera Photographic Provenance -- Ch. 6. Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication -- Ch. 7. Challenges and Solutions in Multimedia Document Authentication -- Ch. 8. Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications -- Ch. 9. Novel Multilevel DCT Based Reversible Data Hiding -- Ch. 10. Massively Threaded Digital Forensics Tools -- Ch. 11. Testing Digital Forensic Software Tools Used in Expert Testimony -- Ch. 12. Network Forensics: A Practical Introduction -- Ch. 13. Novel Intrusion Detection System for Smart Space -- Ch. 14. Deception Detection on the Internet -- Ch. 15. Forensic Investigation of Peer-to-Peer Networks -- Ch. 16. Identity Theft through the Web -- Ch. 17. Embedded Forensics: An Ongoing Research about SIM/USIM Cards -- Ch. 18. Forensic Implications of Virtualization Technologies -- Ch. 19. Conceptual Tools for Dealing with Narrative Terrorism Information -- Ch. 20. Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process -- Ch. 21. Legal Issues for Research and Practice in Computational Forensics -- Ch. 22. Trends in Information Security Regulation.
|
650 |
|
|
|a Computer crimes
|
650 |
|
|
|a Computer crimes
|x Prevention
|
650 |
|
|
|a Forensic sciences
|
700 |
1 |
|
|a Li, Chang-tsun
|
952 |
|
|
|a GrThPMO
|b 59b016026c5ad17d7e5ad9c4
|c 952a
|d 9528
|e HV6773.H374 2010
|t 7
|x m
|z Books
|