Handbook of research on network forensics and analysis techniques:
"This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-s...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Disseminator of Knowledge
[2018]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-20 DE-898 DE-83 Volltext |
Zusammenfassung: | "This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"... |
Beschreibung: | 1 Online-Ressource (xxxii, 509 Seiten) |
ISBN: | 9781522541011 |
DOI: | 10.4018/978-1-5225-4100-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044827342 | ||
003 | DE-604 | ||
005 | 20190725 | ||
007 | cr|uuu---uuuuu | ||
008 | 180305s2018 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522541011 |9 978-1-5225-4101-1 | ||
024 | 7 | |a 10.4018/978-1-5225-4100-4 |2 doi | |
035 | |a (OCoLC)1027775898 | ||
035 | |a (DE-599)BVBBV044827342 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-706 |a DE-573 |a DE-91 |a DE-20 |a DE-898 |a DE-83 | ||
050 | 0 | |a HV8079.C65 | |
082 | 0 | |a 363.25/968 |2 23 | |
245 | 1 | 0 | |a Handbook of research on network forensics and analysis techniques |c Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B.B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France), Nilanjan Dey (Techno India College of Technology, India) |
246 | 1 | 3 | |a Network forensics and analysis techniques |
264 | 1 | |a Hershey PA, USA |b IGI Global, Disseminator of Knowledge |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (xxxii, 509 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
520 | |a "This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"... | ||
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Shrivastava, Gulshan |d 1987- |4 edt | |
700 | 1 | |a Kumar, Prabhat |4 edt | |
700 | 1 | |a Gupta, B. B. |4 edt | |
700 | 1 | |a Bala, Suman |4 edt | |
700 | 1 | |a Dey, Nilanjan |d 1984- |0 (DE-588)1104273500 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-4100-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-4100-4 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-4100-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-4100-4 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-4100-4 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE18 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-4100-4 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-4100-4 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-4100-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079008226836480 |
---|---|
adam_text | |
any_adam_object | |
author2 | Shrivastava, Gulshan 1987- Kumar, Prabhat Gupta, B. B. Bala, Suman Dey, Nilanjan 1984- |
author2_role | edt edt edt edt edt |
author2_variant | g s gs p k pk b b g bb bbg s b sb n d nd |
author_GND | (DE-588)1104273500 |
author_facet | Shrivastava, Gulshan 1987- Kumar, Prabhat Gupta, B. B. Bala, Suman Dey, Nilanjan 1984- |
building | Verbundindex |
bvnumber | BV044827342 |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 |
callnumber-search | HV8079.C65 |
callnumber-sort | HV 48079 C65 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1027775898 (DE-599)BVBBV044827342 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
doi_str_mv | 10.4018/978-1-5225-4100-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044827342</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190725</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180305s2018 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522541011</subfield><subfield code="9">978-1-5225-4101-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-4100-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027775898</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044827342</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8079.C65</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of research on network forensics and analysis techniques</subfield><subfield code="c">Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B.B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France), Nilanjan Dey (Techno India College of Technology, India)</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Network forensics and analysis techniques</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxii, 509 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shrivastava, Gulshan</subfield><subfield code="d">1987-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Prabhat</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, B. B.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bala, Suman</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dey, Nilanjan</subfield><subfield code="d">1984-</subfield><subfield code="0">(DE-588)1104273500</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-4100-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-4100-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-4100-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4100-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4100-4</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE18</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4100-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4100-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4100-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044827342 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:09Z |
institution | BVB |
isbn | 9781522541011 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030222230 |
oclc_num | 1027775898 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-BY-TUM DE-20 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-BY-TUM DE-20 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xxxii, 509 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE18 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Handbook of research on network forensics and analysis techniques Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B.B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France), Nilanjan Dey (Techno India College of Technology, India) Network forensics and analysis techniques Hershey PA, USA IGI Global, Disseminator of Knowledge [2018] © 2018 1 Online-Ressource (xxxii, 509 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series "This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"... Computer crimes Investigation Computer networks Security measures Shrivastava, Gulshan 1987- edt Kumar, Prabhat edt Gupta, B. B. edt Bala, Suman edt Dey, Nilanjan 1984- (DE-588)1104273500 edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-4100-4 Erscheint auch als Druck-Ausgabe 1-5225-4100-4 https://doi.org/10.4018/978-1-5225-4100-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Handbook of research on network forensics and analysis techniques Computer crimes Investigation Computer networks Security measures |
title | Handbook of research on network forensics and analysis techniques |
title_alt | Network forensics and analysis techniques |
title_auth | Handbook of research on network forensics and analysis techniques |
title_exact_search | Handbook of research on network forensics and analysis techniques |
title_full | Handbook of research on network forensics and analysis techniques Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B.B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France), Nilanjan Dey (Techno India College of Technology, India) |
title_fullStr | Handbook of research on network forensics and analysis techniques Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B.B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France), Nilanjan Dey (Techno India College of Technology, India) |
title_full_unstemmed | Handbook of research on network forensics and analysis techniques Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B.B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France), Nilanjan Dey (Techno India College of Technology, India) |
title_short | Handbook of research on network forensics and analysis techniques |
title_sort | handbook of research on network forensics and analysis techniques |
topic | Computer crimes Investigation Computer networks Security measures |
topic_facet | Computer crimes Investigation Computer networks Security measures |
url | https://doi.org/10.4018/978-1-5225-4100-4 |
work_keys_str_mv | AT shrivastavagulshan handbookofresearchonnetworkforensicsandanalysistechniques AT kumarprabhat handbookofresearchonnetworkforensicsandanalysistechniques AT guptabb handbookofresearchonnetworkforensicsandanalysistechniques AT balasuman handbookofresearchonnetworkforensicsandanalysistechniques AT deynilanjan handbookofresearchonnetworkforensicsandanalysistechniques AT shrivastavagulshan networkforensicsandanalysistechniques AT kumarprabhat networkforensicsandanalysistechniques AT guptabb networkforensicsandanalysistechniques AT balasuman networkforensicsandanalysistechniques AT deynilanjan networkforensicsandanalysistechniques |