Listing 1 - 10 of 31 | << page >> |
Sort by
|
Choose an application
Annotation
Computer security. --- Digital forensic science --- Engineering & Applied Sciences --- Computer Science --- Applied Mathematics --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation
Choose an application
Digital forensic science. --- Image processing --- Digital techniques. --- Digital image processing --- Digital electronics --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation
Choose an application
Biometric identification --- Digital forensic science. --- Technological innovations. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification
Choose an application
Database security. --- Digital forensic science. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Data base security --- Databases --- Computer security --- Security measures
Choose an application
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including whe
Computer crimes --- Evidence, Criminal. --- Forensic sciences. --- Investigation. --- Criminalistics --- Forensic science --- Criminal evidence --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Digital forensic science. --- Computer and network forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Science --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt
Choose an application
This book is an open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
Digital forensic science. --- Multimedia systems. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Media Forensics --- Digital Image Forensics --- Video Forensics --- Sensor Noise (PRNU) --- Deepfakes --- Digital Integrity --- Video Tampering Detection --- Image Tampering Detection --- ENF --- Counter-Forensics --- Criminalística --- Sistemes multimèdia
Choose an application
Digital forensic science. --- Internet of things. --- Data privacy. --- Information privacy --- Information resources management --- Privacy --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Internet de les coses --- Seguretat informàtica
Choose an application
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations. This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available. This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security. Learn all about what Digital Forensics entails Build a toolkit and prepare an investigative plan Understand the common artifacts to look for during an exam
Information Technology --- General and Others --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Computer crimes --- Criminal investigation --- Investigation. --- Computer crimes. --- Electronics in criminal investigation. --- Investigation --- Digital forensic science. --- Computer and network forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Evidence, Criminal. --- Criminal evidence --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Electronic bugging --- Electronic listening devices --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
Digital forensic science --- Forensic sciences --- Criminal investigation --- Forensic Medicine --- Data processing --- Data processing. --- Medicine, Forensic --- Medicine, Legal --- Legal Medicine --- Jurisprudence --- Law Enforcement --- Biometric Identification --- DNA Contamination --- Crime detection --- Crime investigation --- Criminal investigations --- Detection of crime --- Investigations --- Law enforcement --- Crime scenes --- Detectives --- Informers --- Suspects (Criminal investigation) --- Criminalistics --- Forensic science --- Science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Digital preservation --- Digital forensic science. --- Criminalística --- Medicina legal --- Criminalística. --- Medicina legal. --- Criminalística. --- Forensic Medicine.
Choose an application
This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3–4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.
Computer security --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Telecommunication. --- Computer networks—Security measures. --- Blockchains (Databases). --- Data protection. --- Forensic sciences. --- Communications Engineering, Networks. --- Mobile and Network Security. --- Blockchain. --- Data and Information Security. --- Forensic Science. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Block chains (Databases) --- Database security --- Distributed databases
Listing 1 - 10 of 31 | << page >> |
Sort by
|