Cyber security, cyber crime and cyber forensics: applications and perspectives
"This book provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics" - Provided by publisher
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2011]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics" - Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xix, 295 Seiten) |
ISBN: | 9781609601256 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044301015 | ||
003 | DE-604 | ||
005 | 20220209 | ||
007 | cr|uuu---uuuuu | ||
008 | 170508s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781609601256 |9 978-1-60960-125-6 | ||
024 | 7 | |a 10.4018/978-1-60960-123-2 |2 doi | |
035 | |a (OCoLC)992525894 | ||
035 | |a (DE-599)BVBBV044301015 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Cyber security, cyber crime and cyber forensics |b applications and perspectives |c Raghu Santanam (Arizona State University, USA), M. Sethumadhavan (Amrita Vishwa Vidyapeetham, India), Mohit Virendra (State University of New York at Buffalo, USA) |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2011] | |
264 | 4 | |c © 2011 | |
300 | |a 1 Online-Ressource (xix, 295 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. The UID project / Rajarshi Chakraborthy ... et al. -- 2. Combined impact of outsourcing and hard times on BPO risk and security / C. Axelrod, Sukumar Haldar -- 3. A comparison of cyber-crime definitions in India and the United States / Himanshu Maheshwari, H.S. Hyman, Manish Agrawal -- 4. Emergency response to Mumbai terror attacks / Divya Shankar, Manish Agrawal, H. Rao -- 5. Pirates of the copyright and cyberspace / Charulata Chaudhary, Ishupal Kang -- 6. Classifying host anomalies / Suja Ramachandran ... et al. -- 7. Securing next generation internet services / Asoke Talukder -- 8. An examination of identity management models in an internet setting / Kenneth Giuliani, V. Murty -- 9. Securing cloud environment / N Harini, C. Shyamala, T. Padmanabhan -- 10. DoS attacks in MANETs / Rajbir Kaur ... et al. -- | |
505 | 8 | |a 11. Detecting cheating aggregators and report dropping attacks in wireless sensor networks / Mohit Virendra, Qi Duan, Shambhu Upadhyaya -- 12. Extended time machine design using reconfigurable computing for efficient recording and retrieval of gigabit network traffic / S. Kumar, M. Prasad, Suresh Pilli -- 13. Metamorphic malware analysis and detection methods / P. Vinod, V. Laxmi, M.S. Gaur -- 14. Towards checking tampering of software / N.V.Narendra Kumar, Harshit Shah, R.K. Shyamasundar -- 15. Complexity measures of cryptographically secure Boolean functions / Chungath Srinivasan, K.V. Lakshmy, M. Sethumadhavan -- 16. Einstein-Podolsky-Rosen paradox and certain aspects of quantum cryptology with some applications / Narayanankutty Karuppath, P. Achuthan -- 17. Error linear complexity measures of binary multisequences / M. Sindhu, S. Sajan, M. Sethumadhavan -- 18. A survey on digital image steganographic methods / P. Amritha, T. Gireesh | |
520 | |a "This book provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics" - Provided by publisher | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberspace / Security measures | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer crimes / Investigation | |
650 | 0 | 7 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 2 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Santanam, Raghu T. |0 (DE-588)1139985914 |4 edt | |
700 | 1 | |a Sethumadhavan, M. |4 edt | |
700 | 1 | |a Virendra, Mohit |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-60960-123-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-60960-123-8 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-123-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029704892 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-123-2 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-123-2 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-123-2 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-123-2 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-123-2 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138508718571520 |
---|---|
adam_text | |
any_adam_object | |
author2 | Santanam, Raghu T. Sethumadhavan, M. Virendra, Mohit |
author2_role | edt edt edt |
author2_variant | r t s rt rts m s ms m v mv |
author_GND | (DE-588)1139985914 |
author_facet | Santanam, Raghu T. Sethumadhavan, M. Virendra, Mohit |
building | Verbundindex |
bvnumber | BV044301015 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. The UID project / Rajarshi Chakraborthy ... et al. -- 2. Combined impact of outsourcing and hard times on BPO risk and security / C. Axelrod, Sukumar Haldar -- 3. A comparison of cyber-crime definitions in India and the United States / Himanshu Maheshwari, H.S. Hyman, Manish Agrawal -- 4. Emergency response to Mumbai terror attacks / Divya Shankar, Manish Agrawal, H. Rao -- 5. Pirates of the copyright and cyberspace / Charulata Chaudhary, Ishupal Kang -- 6. Classifying host anomalies / Suja Ramachandran ... et al. -- 7. Securing next generation internet services / Asoke Talukder -- 8. An examination of identity management models in an internet setting / Kenneth Giuliani, V. Murty -- 9. Securing cloud environment / N Harini, C. Shyamala, T. Padmanabhan -- 10. DoS attacks in MANETs / Rajbir Kaur ... et al. -- 11. Detecting cheating aggregators and report dropping attacks in wireless sensor networks / Mohit Virendra, Qi Duan, Shambhu Upadhyaya -- 12. Extended time machine design using reconfigurable computing for efficient recording and retrieval of gigabit network traffic / S. Kumar, M. Prasad, Suresh Pilli -- 13. Metamorphic malware analysis and detection methods / P. Vinod, V. Laxmi, M.S. Gaur -- 14. Towards checking tampering of software / N.V.Narendra Kumar, Harshit Shah, R.K. Shyamasundar -- 15. Complexity measures of cryptographically secure Boolean functions / Chungath Srinivasan, K.V. Lakshmy, M. Sethumadhavan -- 16. Einstein-Podolsky-Rosen paradox and certain aspects of quantum cryptology with some applications / Narayanankutty Karuppath, P. Achuthan -- 17. Error linear complexity measures of binary multisequences / M. Sindhu, S. Sajan, M. Sethumadhavan -- 18. A survey on digital image steganographic methods / P. Amritha, T. Gireesh |
ctrlnum | (OCoLC)992525894 (DE-599)BVBBV044301015 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044301015</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220209</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170508s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781609601256</subfield><subfield code="9">978-1-60960-125-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-60960-123-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992525894</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044301015</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security, cyber crime and cyber forensics</subfield><subfield code="b">applications and perspectives</subfield><subfield code="c">Raghu Santanam (Arizona State University, USA), M. Sethumadhavan (Amrita Vishwa Vidyapeetham, India), Mohit Virendra (State University of New York at Buffalo, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 295 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. The UID project / Rajarshi Chakraborthy ... et al. -- 2. Combined impact of outsourcing and hard times on BPO risk and security / C. Axelrod, Sukumar Haldar -- 3. A comparison of cyber-crime definitions in India and the United States / Himanshu Maheshwari, H.S. Hyman, Manish Agrawal -- 4. Emergency response to Mumbai terror attacks / Divya Shankar, Manish Agrawal, H. Rao -- 5. Pirates of the copyright and cyberspace / Charulata Chaudhary, Ishupal Kang -- 6. Classifying host anomalies / Suja Ramachandran ... et al. -- 7. Securing next generation internet services / Asoke Talukder -- 8. An examination of identity management models in an internet setting / Kenneth Giuliani, V. Murty -- 9. Securing cloud environment / N Harini, C. Shyamala, T. Padmanabhan -- 10. DoS attacks in MANETs / Rajbir Kaur ... et al. --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">11. Detecting cheating aggregators and report dropping attacks in wireless sensor networks / Mohit Virendra, Qi Duan, Shambhu Upadhyaya -- 12. Extended time machine design using reconfigurable computing for efficient recording and retrieval of gigabit network traffic / S. Kumar, M. Prasad, Suresh Pilli -- 13. Metamorphic malware analysis and detection methods / P. Vinod, V. Laxmi, M.S. Gaur -- 14. Towards checking tampering of software / N.V.Narendra Kumar, Harshit Shah, R.K. Shyamasundar -- 15. Complexity measures of cryptographically secure Boolean functions / Chungath Srinivasan, K.V. Lakshmy, M. Sethumadhavan -- 16. Einstein-Podolsky-Rosen paradox and certain aspects of quantum cryptology with some applications / Narayanankutty Karuppath, P. Achuthan -- 17. Error linear complexity measures of binary multisequences / M. Sindhu, S. Sajan, M. Sethumadhavan -- 18. A survey on digital image steganographic methods / P. Amritha, T. Gireesh</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Santanam, Raghu T.</subfield><subfield code="0">(DE-588)1139985914</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sethumadhavan, M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Virendra, Mohit</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-60960-123-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-60960-123-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-123-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029704892</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-123-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-123-2</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-123-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-123-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-123-2</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044301015 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:07:35Z |
institution | BVB |
isbn | 9781609601256 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029704892 |
oclc_num | 992525894 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xix, 295 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Cyber security, cyber crime and cyber forensics applications and perspectives Raghu Santanam (Arizona State University, USA), M. Sethumadhavan (Amrita Vishwa Vidyapeetham, India), Mohit Virendra (State University of New York at Buffalo, USA) Hershey ; New York Information Science Reference [2011] © 2011 1 Online-Ressource (xix, 295 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. The UID project / Rajarshi Chakraborthy ... et al. -- 2. Combined impact of outsourcing and hard times on BPO risk and security / C. Axelrod, Sukumar Haldar -- 3. A comparison of cyber-crime definitions in India and the United States / Himanshu Maheshwari, H.S. Hyman, Manish Agrawal -- 4. Emergency response to Mumbai terror attacks / Divya Shankar, Manish Agrawal, H. Rao -- 5. Pirates of the copyright and cyberspace / Charulata Chaudhary, Ishupal Kang -- 6. Classifying host anomalies / Suja Ramachandran ... et al. -- 7. Securing next generation internet services / Asoke Talukder -- 8. An examination of identity management models in an internet setting / Kenneth Giuliani, V. Murty -- 9. Securing cloud environment / N Harini, C. Shyamala, T. Padmanabhan -- 10. DoS attacks in MANETs / Rajbir Kaur ... et al. -- 11. Detecting cheating aggregators and report dropping attacks in wireless sensor networks / Mohit Virendra, Qi Duan, Shambhu Upadhyaya -- 12. Extended time machine design using reconfigurable computing for efficient recording and retrieval of gigabit network traffic / S. Kumar, M. Prasad, Suresh Pilli -- 13. Metamorphic malware analysis and detection methods / P. Vinod, V. Laxmi, M.S. Gaur -- 14. Towards checking tampering of software / N.V.Narendra Kumar, Harshit Shah, R.K. Shyamasundar -- 15. Complexity measures of cryptographically secure Boolean functions / Chungath Srinivasan, K.V. Lakshmy, M. Sethumadhavan -- 16. Einstein-Podolsky-Rosen paradox and certain aspects of quantum cryptology with some applications / Narayanankutty Karuppath, P. Achuthan -- 17. Error linear complexity measures of binary multisequences / M. Sindhu, S. Sajan, M. Sethumadhavan -- 18. A survey on digital image steganographic methods / P. Amritha, T. Gireesh "This book provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics" - Provided by publisher Computer security Cyberspace / Security measures Computer crimes Computer crimes / Investigation Sicherheitsmaßnahme (DE-588)4181167-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s Cyberspace (DE-588)4266146-8 s Sicherheitsmaßnahme (DE-588)4181167-7 s DE-604 Santanam, Raghu T. (DE-588)1139985914 edt Sethumadhavan, M. edt Virendra, Mohit edt Erscheint auch als Druck-Ausgabe 978-1-60960-123-2 Erscheint auch als Druck-Ausgabe 1-60960-123-8 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-123-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cyber security, cyber crime and cyber forensics applications and perspectives 1. The UID project / Rajarshi Chakraborthy ... et al. -- 2. Combined impact of outsourcing and hard times on BPO risk and security / C. Axelrod, Sukumar Haldar -- 3. A comparison of cyber-crime definitions in India and the United States / Himanshu Maheshwari, H.S. Hyman, Manish Agrawal -- 4. Emergency response to Mumbai terror attacks / Divya Shankar, Manish Agrawal, H. Rao -- 5. Pirates of the copyright and cyberspace / Charulata Chaudhary, Ishupal Kang -- 6. Classifying host anomalies / Suja Ramachandran ... et al. -- 7. Securing next generation internet services / Asoke Talukder -- 8. An examination of identity management models in an internet setting / Kenneth Giuliani, V. Murty -- 9. Securing cloud environment / N Harini, C. Shyamala, T. Padmanabhan -- 10. DoS attacks in MANETs / Rajbir Kaur ... et al. -- 11. Detecting cheating aggregators and report dropping attacks in wireless sensor networks / Mohit Virendra, Qi Duan, Shambhu Upadhyaya -- 12. Extended time machine design using reconfigurable computing for efficient recording and retrieval of gigabit network traffic / S. Kumar, M. Prasad, Suresh Pilli -- 13. Metamorphic malware analysis and detection methods / P. Vinod, V. Laxmi, M.S. Gaur -- 14. Towards checking tampering of software / N.V.Narendra Kumar, Harshit Shah, R.K. Shyamasundar -- 15. Complexity measures of cryptographically secure Boolean functions / Chungath Srinivasan, K.V. Lakshmy, M. Sethumadhavan -- 16. Einstein-Podolsky-Rosen paradox and certain aspects of quantum cryptology with some applications / Narayanankutty Karuppath, P. Achuthan -- 17. Error linear complexity measures of binary multisequences / M. Sindhu, S. Sajan, M. Sethumadhavan -- 18. A survey on digital image steganographic methods / P. Amritha, T. Gireesh Computer security Cyberspace / Security measures Computer crimes Computer crimes / Investigation Sicherheitsmaßnahme (DE-588)4181167-7 gnd Computersicherheit (DE-588)4274324-2 gnd Cyberspace (DE-588)4266146-8 gnd |
subject_GND | (DE-588)4181167-7 (DE-588)4274324-2 (DE-588)4266146-8 (DE-588)4143413-4 |
title | Cyber security, cyber crime and cyber forensics applications and perspectives |
title_auth | Cyber security, cyber crime and cyber forensics applications and perspectives |
title_exact_search | Cyber security, cyber crime and cyber forensics applications and perspectives |
title_full | Cyber security, cyber crime and cyber forensics applications and perspectives Raghu Santanam (Arizona State University, USA), M. Sethumadhavan (Amrita Vishwa Vidyapeetham, India), Mohit Virendra (State University of New York at Buffalo, USA) |
title_fullStr | Cyber security, cyber crime and cyber forensics applications and perspectives Raghu Santanam (Arizona State University, USA), M. Sethumadhavan (Amrita Vishwa Vidyapeetham, India), Mohit Virendra (State University of New York at Buffalo, USA) |
title_full_unstemmed | Cyber security, cyber crime and cyber forensics applications and perspectives Raghu Santanam (Arizona State University, USA), M. Sethumadhavan (Amrita Vishwa Vidyapeetham, India), Mohit Virendra (State University of New York at Buffalo, USA) |
title_short | Cyber security, cyber crime and cyber forensics |
title_sort | cyber security cyber crime and cyber forensics applications and perspectives |
title_sub | applications and perspectives |
topic | Computer security Cyberspace / Security measures Computer crimes Computer crimes / Investigation Sicherheitsmaßnahme (DE-588)4181167-7 gnd Computersicherheit (DE-588)4274324-2 gnd Cyberspace (DE-588)4266146-8 gnd |
topic_facet | Computer security Cyberspace / Security measures Computer crimes Computer crimes / Investigation Sicherheitsmaßnahme Computersicherheit Cyberspace Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-123-2 |
work_keys_str_mv | AT santanamraghut cybersecuritycybercrimeandcyberforensicsapplicationsandperspectives AT sethumadhavanm cybersecuritycybercrimeandcyberforensicsapplicationsandperspectives AT virendramohit cybersecuritycybercrimeandcyberforensicsapplicationsandperspectives |