Narrow your search

Library

Odisee (31)

Thomas More Kempen (31)

Thomas More Mechelen (31)

UCLL (31)

VIVES (31)

KU Leuven (30)

ULiège (30)

ULB (28)

KBC (7)

LUCA School of Arts (5)

More...

Resource type

book (30)

periodical (1)


Language

English (31)


Year
From To Submit

2022 (7)

2021 (2)

2020 (3)

2018 (1)

2014 (2)

More...
Listing 1 - 10 of 31 << page
of 4
>>
Sort by
Computer and intrusion forensics
Author:
ISBN: 1580536301 9781580536301 1580533698 Year: 2003 Publisher: Boston Artech House


Book
Image copy-move forgery detection : new tools and techniques
Authors: ---
ISBN: 9811690405 9811690413 Year: 2022 Publisher: Singapore : Springer,


Book
Breakthroughs in digital biometrics and forensics
Authors: --- ---
ISBN: 3031107055 3031107063 Year: 2022 Publisher: Cham, Switzerland : Springer International Publishing,


Book
A practical hands-on approach to database forensics
Authors: ---
ISBN: 3031161262 3031161270 Year: 2022 Publisher: Cham, Switzerland : Springer,


Book
Computer incident response and forensics team management : conducting a successful incident response
Authors: ---
ISBN: 0124047254 159749996X 1306133157 9780124047259 9781597499965 Year: 2014 Publisher: Waltham, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including whe


Book
Multimedia forensics
Authors: --- --- ---
ISBN: 9811676216 9811676208 Year: 2022 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is an open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field


Book
Privacy, security and forensics in the Internet of Things (IoT)
Author:
ISBN: 3030912175 3030912183 Year: 2022 Publisher: Cham, Switzerland : Springer,


Book
The basics of digital forensics : the primer for getting started in digital forensics
Author:
ISBN: 1597496618 0128018925 1597496626 1280582197 9786613611970 0128016353 9781597496612 9781597496629 9780128018927 9780128016350 6613611972 9781280582196 9780128016350 Year: 2012 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations. This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available. This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security. Learn all about what Digital Forensics entails Build a toolkit and prepare an investigative plan Understand the common artifacts to look for during an exam


Book
Cyber Security and Digital Forensics : Proceedings of ICCSDF 2021
Authors: --- ---
ISBN: 9811639612 9811639604 Year: 2022 Publisher: Singapore : Springer Nature Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3–4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.

Listing 1 - 10 of 31 << page
of 4
>>
Sort by