Listing 1 - 10 of 22 | << page >> |
Sort by
|
Choose an application
This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book. .
Data protection. --- Forensic medicine. --- Computer crimes. --- Computer security. --- Multimedia systems. --- Security. --- Forensic Science. --- Cybercrime. --- Systems and Data Security. --- Multimedia Information Systems. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Forensic sciences --- Medicine --- Medical laws and legislation --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection --- Security measures --- Digital forensic science. --- Forensic science. --- Multimedia information systems. --- Criminalistics --- Forensic science --- Science --- Criminal investigation
Choose an application
This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book. .
Legal medicine --- Criminal law. Criminal procedure --- Production management --- Computer architecture. Operating systems --- Computer. Automation --- gerechtelijk onderzoek --- veiligheid (mensen) --- informatica --- landbouw --- multimedia --- gerechtelijke geneeskunde --- computerbeveiliging --- computercriminaliteit
Choose an application
Rural-urban migration within China has transformed and reshaped rural people's lives during the past few decades, and has been one of the most visible phenomena of the economic reforms enacted since the late 1970s. Whilst Feminist scholars have addressed rural women's experience of struggle and empowerment in urban China, in contrast, research on rural men's experience of migration is a neglected area of study. In response, this book seeks to address the absence of male migrant workers as a gendered category within the current literature on rural-urban migration.Examining Chin
Rural-urban migration --- Migration, Internal --- Male employees --- Masculinity --- Men --- History.
Choose an application
Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats. Additional features of this book include: . An introduction to standardization and industry activities as well as government regulation in secure vehicular networking. Eight novel secure and privacy-preserving schemes for vehicular communications. Explorations into interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique The authors have taken a non-traditional method toward securing communications, allowing for new research directions in security and privacy in VANETs, which will be helpful to students, researchers, and IT practitioners.
Choose an application
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .
Computer security. --- Cloud computing. --- Internet of things. --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Electronic data processing --- Web services --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Data protection. --- Wireless communication systems. --- Mobile communication systems. --- Telecommunication. --- Security. --- Wireless and Mobile Communication. --- Communications Engineering, Networks. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Communication systems --- Electrical engineering. --- Electric engineering --- Engineering
Choose an application
Wireless networking technologies are witnessed to become the integral part of industry, business, entertainment and daily life. Encyclopedia of Wireless Networks is expected to provide comprehensive references to key concepts of wireless networks, including research results of historical significance, areas of current interests, and growing directions in the future wireless networks. It can serve as a valuable and authoritative literature for students, researchers, engineers, and practitioners who need a quick reference to the subjects of wireless network technology and its relevant applications. Areas covered: 5G Network / Editors: Rahim Tafazolli, Rose Hu Ad hoc Network / Editor: Cheng Li Big Data for Networking / Editor: Song Guo Cellular Network, 2G/3G Network, 4G/LTE Network / Editor: Hsiao-hwa Chen Cognitive Radio Network / Editor: Ning Zhang Cooperative Communications / Editor: Kaoru Ota Cyber Physical Systems / Editor: Shiyan Hu Data Center Network / Editor: Lei Lei Delay Tolerant and Opportunistic Network / Editor: Yuanguo Bi Equalization, Synchronization and Channel Estimation / Editor: Yingying Chen Future Network Architecture / Editor: Wei Quan Game Theory in Wireless Network / Editor: Dusit Niyato Interference Characterization and Mitigation / Editor: Lin Cai Internet of Things / Editors: Xiuzhen Cheng, Wei Cheng Internet of Things and its Applications / Editor: Phone Lin Interworking Heterogeneous Wireless Network / Editor: Ping Wang Medium Access Control / Editors: Hassan Omar, Qiang Ye Millimeter-wave Communications / Editor: Ming Xiao MIMO-based Network / Editor: Prof. Wei Zhang Mobility Management and Models / Editors: Sandra Cespedes, Sangheon Pack Molecular, Biological and Multi-scale Communications / Editor: Adam Noel Network Economics and pricing / Editors: Jianwei Huang, Yuan Luo Network Forensics and surveillance, Fault Tolerance and Reliability / Editor: Hongwei Li Network Measurement and Virtualization / Editor: Yusheng Ji Quality of Service, Quality of Experience and Quality of Protection / Editors: Rui Luis Aguiar, Yu Cheng Resource Allocation and Management / Editors: Junshan Zhang, Nan Cheng Routing and Multi-cast, Router and Switch Design / Editor: Richard Yu Scaling Laws and Fundamental Limits / Editor: Ning Lu Security, Privacy and Trust / Editor: Kui Ren Short Range Communications, RFID and NFC / Editor: Zhiguo Shi Smart Grid Communications / Editor: Vincent W. S. Wong Vehicular Network / Editors: Lian Zhao, Qing Yang Video Streaming / Editor: Zhi Liu Wireless Body Area Network and e-healthcare / Editor: Honggang Wang Wireless Security / Editors: Haojin Zhu, Jian Shen Wireless Sensor Network / Editors: Jiming Chen, Ruilong Deng WLAN and OFDM / Editor: Xianbin Wang.
Computer communication systems. --- Wireless communication systems. --- Mobile communication systems. --- Electrical engineering. --- Power electronics. --- Computer Communication Networks. --- Wireless and Mobile Communication. --- Communications Engineering, Networks. --- Power Electronics, Electrical Machines and Networks. --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Electric engineering --- Engineering --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Electronics, Power --- Electric power --- Electronics --- Distributed processing --- Communication systems --- Computer networks --- Computer networks. --- Telecommunication. --- Electric power production. --- Electrical Power Engineering. --- Electric power generation --- Electricity generation --- Power production, Electric --- Electric power systems --- Electrification --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .
Telecommunication technology --- Production management --- Mass communications --- Computer architecture. Operating systems --- Computer. Automation --- draadloze computernetwerken --- veiligheid (mensen) --- IoT (Internet of Things) --- mobiele netwerken --- tekstverwerking --- computerbeveiliging --- mobiele communicatie --- communicatietechnologie
Choose an application
Wireless networking technologies are witnessed to become the integral part of industry, business, entertainment and daily life. Encyclopedia of Wireless Networks is expected to provide comprehensive references to key concepts of wireless networks, including research results of historical significance, areas of current interests, and growing directions in the future wireless networks. It can serve as a valuable and authoritative literature for students, researchers, engineers, and practitioners who need a quick reference to the subjects of wireless network technology and its relevant applications. Areas covered: 5G Network | Editors: Rahim Tafazolli, Rose Hu Ad hoc Network | Editor: Cheng Li Big Data for Networking | Editor: Song Guo Cellular Network, 2G/3G Network, 4G/LTE Network | Editor: Hsiao-hwa Chen Cognitive Radio Network | Editor: Ning Zhang Cooperative Communications | Editor: Kaoru Ota Cyber Physical Systems | Editor: Shiyan Hu Data Center Network | Editor: Lei Lei Delay Tolerant and Opportunistic Network | Editor: Yuanguo Bi Equalization, Synchronization and Channel Estimation | Editor: Yingying Chen Future Network Architecture | Editor: Wei Quan Game Theory in Wireless Network | Editor: Dusit Niyato Interference Characterization and Mitigation | Editor: Lin Cai Internet of Things | Editors: Xiuzhen Cheng, Wei Cheng Internet of Things and its Applications | Editor: Phone Lin Interworking Heterogeneous Wireless Network | Editor: Ping Wang Medium Access Control | Editors: Hassan Omar, Qiang Ye Millimeter-wave Communications | Editor: Ming Xiao MIMO-based Network | Editor: Prof. Wei Zhang Mobility Management and Models | Editors: Sandra Cespedes, Sangheon Pack Molecular, Biological and Multi-scale Communications | Editor: Adam Noel Network Economics and pricing | Editors: Jianwei Huang, Yuan Luo Network Forensics and surveillance, Fault Tolerance and Reliability | Editor: Hongwei Li Network Measurement and Virtualization | Editor: Yusheng Ji Quality of Service, Quality of Experience and Quality of Protection | Editors: Rui Luis Aguiar, Yu Cheng Resource Allocation and Management | Editors: Junshan Zhang, Nan Cheng Routing and Multi-cast, Router and Switch Design | Editor: Richard Yu Scaling Laws and Fundamental Limits | Editor: Ning Lu Security, Privacy and Trust | Editor: Kui Ren Short Range Communications, RFID and NFC | Editor: Zhiguo Shi Smart Grid Communications | Editor: Vincent W. S. Wong Vehicular Network | Editors: Lian Zhao, Qing Yang Video Streaming | Editor: Zhi Liu Wireless Body Area Network and e-healthcare | Editor: Honggang Wang Wireless Security | Editors: Haojin Zhu, Jian Shen Wireless Sensor Network | Editors: Jiming Chen, Ruilong Deng WLAN and OFDM | Editor: Xianbin Wang.
Electronics --- Electrical engineering --- Applied physical engineering --- Computer architecture. Operating systems --- computernetwerken --- elektrotechniek --- vermogenselektronica --- mobiele communicatie
Choose an application
Wireless networking technologies are witnessed to become the integral part of industry, business, entertainment and daily life. Encyclopedia of Wireless Networks is expected to provide comprehensive references to key concepts of wireless networks, including research results of historical significance, areas of current interests, and growing directions in the future wireless networks. It can serve as a valuable and authoritative literature for students, researchers, engineers, and practitioners who need a quick reference to the subjects of wireless network technology and its relevant applications. Areas covered: 5G Network | Editors: Rahim Tafazolli, Rose Hu Ad hoc Network | Editor: Cheng Li Big Data for Networking | Editor: Song Guo Cellular Network, 2G/3G Network, 4G/LTE Network | Editor: Hsiao-hwa Chen Cognitive Radio Network | Editor: Ning Zhang Cooperative Communications | Editor: Kaoru Ota Cyber Physical Systems | Editor: Shiyan Hu Data Center Network | Editor: Lei Lei Delay Tolerant and Opportunistic Network | Editor: Yuanguo Bi Equalization, Synchronization and Channel Estimation | Editor: Yingying Chen Future Network Architecture | Editor: Wei Quan Game Theory in Wireless Network | Editor: Dusit Niyato Interference Characterization and Mitigation | Editor: Lin Cai Internet of Things | Editors: Xiuzhen Cheng, Wei Cheng Internet of Things and its Applications | Editor: Phone Lin Interworking Heterogeneous Wireless Network | Editor: Ping Wang Medium Access Control | Editors: Hassan Omar, Qiang Ye Millimeter-wave Communications | Editor: Ming Xiao MIMO-based Network | Editor: Prof. Wei Zhang Mobility Management and Models | Editors: Sandra Cespedes, Sangheon Pack Molecular, Biological and Multi-scale Communications | Editor: Adam Noel Network Economics and pricing | Editors: Jianwei Huang, Yuan Luo Network Forensics and surveillance, Fault Tolerance and Reliability | Editor: Hongwei Li Network Measurement and Virtualization | Editor: Yusheng Ji Quality of Service, Quality of Experience and Quality of Protection | Editors: Rui Luis Aguiar, Yu Cheng Resource Allocation and Management | Editors: Junshan Zhang, Nan Cheng Routing and Multi-cast, Router and Switch Design | Editor: Richard Yu Scaling Laws and Fundamental Limits | Editor: Ning Lu Security, Privacy and Trust | Editor: Kui Ren Short Range Communications, RFID and NFC | Editor: Zhiguo Shi Smart Grid Communications | Editor: Vincent W. S. Wong Vehicular Network | Editors: Lian Zhao, Qing Yang Video Streaming | Editor: Zhi Liu Wireless Body Area Network and e-healthcare | Editor: Honggang Wang Wireless Security | Editors: Haojin Zhu, Jian Shen Wireless Sensor Network | Editors: Jiming Chen, Ruilong Deng WLAN and OFDM | Editor: Xianbin Wang.
Choose an application
Wireless networking technologies are witnessed to become the integral part of industry, business, entertainment and daily life. Encyclopedia of Wireless Networks is expected to provide comprehensive references to key concepts of wireless networks, including research results of historical significance, areas of current interests, and growing directions in the future wireless networks. It can serve as a valuable and authoritative literature for students, researchers, engineers, and practitioners who need a quick reference to the subjects of wireless network technology and its relevant applications. Areas covered: 5G Network | Editors: Rahim Tafazolli, Rose Hu Ad hoc Network | Editor: Cheng Li Big Data for Networking | Editor: Song Guo Cellular Network, 2G/3G Network, 4G/LTE Network | Editor: Hsiao-hwa Chen Cognitive Radio Network | Editor: Ning Zhang Cooperative Communications | Editor: Kaoru Ota Cyber Physical Systems | Editor: Shiyan Hu Data Center Network | Editor: Lei Lei Delay Tolerant and Opportunistic Network | Editor: Yuanguo Bi Equalization, Synchronization and Channel Estimation | Editor: Yingying Chen Future Network Architecture | Editor: Wei Quan Game Theory in Wireless Network | Editor: Dusit Niyato Interference Characterization and Mitigation | Editor: Lin Cai Internet of Things | Editors: Xiuzhen Cheng, Wei Cheng Internet of Things and its Applications | Editor: Phone Lin Interworking Heterogeneous Wireless Network | Editor: Ping Wang Medium Access Control | Editors: Hassan Omar, Qiang Ye Millimeter-wave Communications | Editor: Ming Xiao MIMO-based Network | Editor: Prof. Wei Zhang Mobility Management and Models | Editors: Sandra Cespedes, Sangheon Pack Molecular, Biological and Multi-scale Communications | Editor: Adam Noel Network Economics and pricing | Editors: Jianwei Huang, Yuan Luo Network Forensics and surveillance, Fault Tolerance and Reliability | Editor: Hongwei Li Network Measurement and Virtualization | Editor: Yusheng Ji Quality of Service, Quality of Experience and Quality of Protection | Editors: Rui Luis Aguiar, Yu Cheng Resource Allocation and Management | Editors: Junshan Zhang, Nan Cheng Routing and Multi-cast, Router and Switch Design | Editor: Richard Yu Scaling Laws and Fundamental Limits | Editor: Ning Lu Security, Privacy and Trust | Editor: Kui Ren Short Range Communications, RFID and NFC | Editor: Zhiguo Shi Smart Grid Communications | Editor: Vincent W. S. Wong Vehicular Network | Editors: Lian Zhao, Qing Yang Video Streaming | Editor: Zhi Liu Wireless Body Area Network and e-healthcare | Editor: Honggang Wang Wireless Security | Editors: Haojin Zhu, Jian Shen Wireless Sensor Network | Editors: Jiming Chen, Ruilong Deng WLAN and OFDM | Editor: Xianbin Wang.
Listing 1 - 10 of 22 | << page >> |
Sort by
|