Cyber Crime and Forensic Computing: Modern Principles, Practices, and Algorithms
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Boston
De Gruyter
[2021]
|
Schriftenreihe: | De Gruyter Frontiers in Computational Intelligence
volume 11 |
Schlagworte: | |
Online-Zugang: | FAW01 FCO01 FHA01 FHR01 FKE01 FLA01 FWS01 FWS02 TUM01 UBG01 UBY01 UPA01 Volltext |
Zusammenfassung: | This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. |
Beschreibung: | 1 Online-Ressource (X, 230 Seiten) Illustrationen |
ISBN: | 9783110677478 9783110677546 |
DOI: | 10.1515/9783110677478 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV047521443 | ||
003 | DE-604 | ||
005 | 20221228 | ||
007 | cr|uuu---uuuuu | ||
008 | 211019s2021 |||| o||u| ||||||eng d | ||
020 | |a 9783110677478 |c PDF |9 978-3-11-067747-8 | ||
020 | |a 9783110677546 |c EPUB |9 978-3-11-067754-6 | ||
024 | 7 | |a 10.1515/9783110677478 |2 doi | |
035 | |a (ZDB-23-DGG)9783110677478 | ||
035 | |a (ZDB-23-DEI)9783110677478 | ||
035 | |a (OCoLC)1284793812 | ||
035 | |a (DE-599)BVBBV047521443 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-858 |a DE-Aug4 |a DE-859 |a DE-860 |a DE-473 |a DE-739 |a DE-91 |a DE-898 |a DE-706 |a DE-862 |a DE-863 | ||
245 | 1 | 0 | |a Cyber Crime and Forensic Computing |b Modern Principles, Practices, and Algorithms |c edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma |
264 | 1 | |a Berlin ; Boston |b De Gruyter |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a 1 Online-Ressource (X, 230 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a De Gruyter Frontiers in Computational Intelligence |v volume 11 | |
520 | |a This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. | ||
520 | |a For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. | ||
520 | |a The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. | ||
650 | 4 | |a Algorithmus | |
650 | 4 | |a Big Data | |
650 | 4 | |a Computerforensik | |
650 | 4 | |a Forensische Informatik | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Maschinelles Lernen | |
650 | 7 | |a COMPUTERS / Intelligence (AI) & Semantics |2 bisacsh | |
700 | 1 | |a Shrivastava, Gulshan |d 1987- |0 (DE-588)1221728288 |4 edt | |
700 | 1 | |a Gupta, Deepak |0 (DE-588)1204268657 |4 edt | |
700 | 1 | |a Sharma, Kavita |0 (DE-588)1221728490 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-11-067737-9 |
830 | 0 | |a De Gruyter Frontiers in Computational Intelligence |v volume 11 |w (DE-604)BV044781960 |9 11 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9783110677478 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG |a ZDB-23-DEI | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032922170 | ||
966 | e | |u https://doi.org/10.1515/9783110677478 |l FAW01 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l FCO01 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l FHA01 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l FHR01 |p ZDB-23-DEI |q ZDB-23-DEI21 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l FKE01 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l FLA01 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l FWS01 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l FWS02 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l TUM01 |p ZDB-23-DEI |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l UBG01 |p ZDB-23-DGG |q UBG_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l UBY01 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110677478 |l UPA01 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 925690 |
---|---|
_version_ | 1806194913953447936 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Shrivastava, Gulshan 1987- Gupta, Deepak Sharma, Kavita |
author2_role | edt edt edt |
author2_variant | g s gs d g dg k s ks |
author_GND | (DE-588)1221728288 (DE-588)1204268657 (DE-588)1221728490 |
author_facet | Shrivastava, Gulshan 1987- Gupta, Deepak Sharma, Kavita |
building | Verbundindex |
bvnumber | BV047521443 |
collection | ZDB-23-DGG ZDB-23-DEI |
ctrlnum | (ZDB-23-DGG)9783110677478 (ZDB-23-DEI)9783110677478 (OCoLC)1284793812 (DE-599)BVBBV047521443 |
doi_str_mv | 10.1515/9783110677478 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05998nmm a2200661 cb4500</leader><controlfield tag="001">BV047521443</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221228 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211019s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110677478</subfield><subfield code="c">PDF</subfield><subfield code="9">978-3-11-067747-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110677546</subfield><subfield code="c">EPUB</subfield><subfield code="9">978-3-11-067754-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110677478</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9783110677478</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DEI)9783110677478</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1284793812</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047521443</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-863</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Crime and Forensic Computing</subfield><subfield code="b">Modern Principles, Practices, and Algorithms</subfield><subfield code="c">edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Boston</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 230 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">De Gruyter Frontiers in Computational Intelligence</subfield><subfield code="v">volume 11</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithmus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big Data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computerforensik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensische Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Maschinelles Lernen</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Intelligence (AI) & Semantics</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shrivastava, Gulshan</subfield><subfield code="d">1987-</subfield><subfield code="0">(DE-588)1221728288</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Deepak</subfield><subfield code="0">(DE-588)1204268657</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharma, Kavita</subfield><subfield code="0">(DE-588)1221728490</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-11-067737-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">De Gruyter Frontiers in Computational Intelligence</subfield><subfield code="v">volume 11</subfield><subfield code="w">(DE-604)BV044781960</subfield><subfield code="9">11</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="a">ZDB-23-DEI</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032922170</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">ZDB-23-DEI21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UBG_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110677478</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047521443 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:23:38Z |
indexdate | 2024-08-01T16:14:59Z |
institution | BVB |
isbn | 9783110677478 9783110677546 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032922170 |
oclc_num | 1284793812 |
open_access_boolean | |
owner | DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-473 DE-BY-UBG DE-739 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-473 DE-BY-UBG DE-739 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 Online-Ressource (X, 230 Seiten) Illustrationen |
psigel | ZDB-23-DGG ZDB-23-DEI ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DEI ZDB-23-DEI21 ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DEI TUM_Paketkauf ZDB-23-DGG UBG_PDA_DGG ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | De Gruyter |
record_format | marc |
series | De Gruyter Frontiers in Computational Intelligence |
series2 | De Gruyter Frontiers in Computational Intelligence |
spellingShingle | Cyber Crime and Forensic Computing Modern Principles, Practices, and Algorithms De Gruyter Frontiers in Computational Intelligence Algorithmus Big Data Computerforensik Forensische Informatik Künstliche Intelligenz Maschinelles Lernen COMPUTERS / Intelligence (AI) & Semantics bisacsh |
title | Cyber Crime and Forensic Computing Modern Principles, Practices, and Algorithms |
title_auth | Cyber Crime and Forensic Computing Modern Principles, Practices, and Algorithms |
title_exact_search | Cyber Crime and Forensic Computing Modern Principles, Practices, and Algorithms |
title_exact_search_txtP | Cyber Crime and Forensic Computing Modern Principles, Practices, and Algorithms |
title_full | Cyber Crime and Forensic Computing Modern Principles, Practices, and Algorithms edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma |
title_fullStr | Cyber Crime and Forensic Computing Modern Principles, Practices, and Algorithms edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma |
title_full_unstemmed | Cyber Crime and Forensic Computing Modern Principles, Practices, and Algorithms edited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma |
title_short | Cyber Crime and Forensic Computing |
title_sort | cyber crime and forensic computing modern principles practices and algorithms |
title_sub | Modern Principles, Practices, and Algorithms |
topic | Algorithmus Big Data Computerforensik Forensische Informatik Künstliche Intelligenz Maschinelles Lernen COMPUTERS / Intelligence (AI) & Semantics bisacsh |
topic_facet | Algorithmus Big Data Computerforensik Forensische Informatik Künstliche Intelligenz Maschinelles Lernen COMPUTERS / Intelligence (AI) & Semantics |
url | https://doi.org/10.1515/9783110677478 |
volume_link | (DE-604)BV044781960 |
work_keys_str_mv | AT shrivastavagulshan cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms AT guptadeepak cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms AT sharmakavita cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms |