• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Handbook of research on computational forensics, digital crime, and investigation :

پدید آورنده
[edited by] Chang-Tsun Li.

موضوع
Computer crimes-- Prevention.,Computer crimes.,Computer security.,Forensic sciences.,Computer crimes-- Prevention.,Computer crimes.,Computer security.,Forensic sciences.,LAW-- Forensic Science.

رده
HV6773
.
H374
2010eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1605668370
(Number (ISBN
9781605668376
Erroneous ISBN
1605668362
Erroneous ISBN
9781605668369

NATIONAL BIBLIOGRAPHY NUMBER

Number
b782827

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Handbook of research on computational forensics, digital crime, and investigation :
General Material Designation
[Book]
Other Title Information
methods and solutions /
First Statement of Responsibility
[edited by] Chang-Tsun Li.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Hershey, PA :
Name of Publisher, Distributor, etc.
Information Science Reference,
Date of Publication, Distribution, etc.
©2010.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xxiii, 595 pages) :
Other Physical Details
illustrations

SERIES

Series Title
Gale virtual reference library

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references (pages 529-567) and index.

CONTENTS NOTE

Text of Note
Privacy enhancing technologies in biometrics / Patrizio Campisi, Emanuele Maiorana, Alessandro Neri -- A fingerprint forensic tool for criminal investigations / Gian Luca Marcialis [and others] -- Principles and methods for face recognition and face modelling / Tim Rawlinson, Abhir Bhalerao, Li Wang -- Biometrical processing of faces in security and forensics / Pawel T. Puslecki -- Digital camera photographic provenance / Matthew Sorell -- Multimedia forensic techniques for acquisition device identification and digital image authentication / Roberto Caldell [and others] -- Challenges and solutions in multimedia document authentication / Stefan Katzenbeisser, Huajian Liu, Martin Steinebach -- Semi-fragile image watermarking, authentication and localization techniques for law enforcement applications / Xi Zhao, Anthony TS Ho -- A novel multilevel DCT based reversible data hiding / Hong Cai, Sos S. Agaian -- Massively threaded digital forensics tools / Lodovico Marziale [and others] -- Testing digital forensic software tools used in expert testimony / Lynn M. Batten, Lei Pan -- Network forensics : a practical introduction / Michael I. Cohen -- A novel intrusion detection system for smart space / Bo Zhou, Qi Shi, Madjid Merabti -- Deception detection on the internet / Xiaoling Chen [and others] -- Forensic investigation of peer-to-peer networks / Ricci S.C. Ieong [and others] -- Identity theft through the web / Thomas M. Chen -- Embedded forensics : an ongoing research about SIM/USIM cards / Antonio Savoldi, Paolo Gubian -- Forensic implications of virtualization technologies / Cosimo Anglano -- Conceptual tools for dealing with 'narrative' terrorism information / Gian Piero Zarri -- Source code authorship analysis for supporting the cybercrime investigation process / Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos -- Legal issues for research and practice in computational forensics / Adel Elmaghraby, Deborah Keeling, Michael Losavio -- Trends in information security regulation / Christopher A. Canning, Baoying Wang.
0

SUMMARY OR ABSTRACT

Text of Note
"This book provides a media for advancing research and the development of theory and practice of digital crime prevention and forensics, embracing a broad range of digital crime and forensics disciplines"--Provided by publisher.

OTHER EDITION IN ANOTHER MEDIUM

Title
Handbook of research on computational forensics, digital crime, and investigation.
International Standard Book Number
9781605668369

TOPICAL NAME USED AS SUBJECT

Computer crimes-- Prevention.
Computer crimes.
Computer security.
Forensic sciences.
Computer crimes-- Prevention.
Computer crimes.
Computer security.
Forensic sciences.
LAW-- Forensic Science.

(SUBJECT CATEGORY (Provisional

LAW-- 041000

DEWEY DECIMAL CLASSIFICATION

Number
363
.
250285
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
HV6773
Book number
.
H374
2010eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Li, Chang-Tsun.

ORIGINATING SOURCE

Date of Transaction
20201206211810.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival