回首頁 到查詢結果 [ subject:"Digital forensic science." ]

Advanced methodologies and technolog...
Khosrow-Pour, Mehdi, (1951-)

FindBook      Google Book      Amazon      博客來     
  • Advanced methodologies and technologies in system security, information privacy, and forensics
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Advanced methodologies and technologies in system security, information privacy, and forensics/ Mehdi Khosrow-Pour, D.B.A., editor.
    其他作者: Khosrow-Pour, Mehdi,
    出版者: Hershey, Pennsylvania :IGI Global, : [2019],
    面頁冊數: 1 online resource (xv, 417 p.)
    內容註: Section 1. Criminal science and forensics. Chapter 1. Forensic investigations in cloud computing ; Chapter 2. Internet-facilitated child sexual exploitation crimes ; Chapter 3. Knowledge-based forensic patterns and engineering system ; Chapter 4. Uncovering limitations of E01 self-verifying files -- Section 2. Cyber crime, cyber bullying, and digital terrorism. Chapter 5. Cyber security protection for online gaming applications ; Chapter 6. Piracy and intellectual property theft in the internet era ; Chapter 7. Secure group key sharing protocols and cloud system -- Section 3. Cyber and network security. Chapter 8. Security of internet-, intranet-, and computer-based examinations in terms of technical, authentication, and environmental, where are we? ; Chapter 9. A three-vector approach to blind spots in cybersecurity ; Chapter 10. Cyber bullying ; Chapter 11. Cyberbullying among Malaysian children based on research evidence ; Chapter 12. The nature, extent, causes, and consequences of cyberbullying -- Section 4. IT security and ethics. Chapter 13. Computer fraud challenges and its legal implications ; Chapter 14. Cost estimation and security investment of security projects ; Chapter 15. Development of personal information privacy concerns evaluation ; Chapter 16. Digital video watermarking using diverse watermarking schemes ; Chapter 17. Ethical computing continues from problem to solution ; Chapter 18. Group signature system using multivariate asymmetric cryptography ; Chapter 19. Hexa-dimension Code of practice for data privacy protection ; Chapter 20. Information and communication technology ethics and social responsibility ; Chapter 21. Intrusion tolerance techniques ; Chapter 22. New perspectives of pattern recognition for automatic credit card fraud detection ; Chapter 23. Privacy, algorithmic discrimination, and the Internet of things ; Chapter 24. The protection policy for youth online in Japan ; Chapter 25. Security of identity-based encryption algorithms ; Chapter 26. Steganography using biometrics ; Chapter 27. Usable security.
    標題: Computer security. -
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7
    ISBN: 9781522574934 (e-book)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9371562 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A353 2019e 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入