Combating security breaches and criminal activity in the digital sphere:
"This book is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users"--Provided by publisher.
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2016]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users"--Provided by publisher. |
Beschreibung: | PDFs (309 pages) : illustrations. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522501947 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00142203 | ||
003 | IGIG | ||
005 | 20160623164329.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 160618s2016 paua fob 001 0 eng d | ||
010 | |z 2016003151 | ||
020 | |a 9781522501947 |q electronic | ||
020 | |z 9781522501930 |q print | ||
024 | 7 | |a 10.4018/978-1-5225-0193-0 |2 doi | |
035 | |a (CaBNVSL)gtp00565985 | ||
035 | |a (OCoLC)951975241 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HV6773 |b .C6495 2016e | |
082 | 7 | |a 363.25/968 |2 23 | |
245 | 0 | 0 | |a Combating security breaches and criminal activity in the digital sphere |c S. Geetha and Asnath Victy Phamila, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2016] | |
300 | |a PDFs (309 pages) : |b illustrations. | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a A review on digital sphere threats and vulnerabilities / Muthuramalingam S., Thangavel M., Sridhar S. -- Advances in biometrics for secure human authentication system: biometric authentication system / Jagannath Mohan, Adalarasu Kanagasabai, Vetrivelan Pandu -- Against spoofing attacks in network layer / Kavisankar L., Chellappan C., Poovammal E. -- Classification of cybercrimes and punishments under the Information Technology Act, 2000 / Sree Krishna Bharadwaj H. -- Cloud crime and fraud: a study of challenges for cloud security and forensics / Nimisha Singh -- Combating cyber security breaches in digital world using misuse detection methods: misuse detection / Subbulakshmi T. -- Critical video surveillance and identification of human behavior analysis of ATM security systems / M. Sivabalakrishnan, R. Menaka, S. Jeeva -- Digital evidence in practice: procedure and tools / Uma N. Dulhare, Shaik Rasool -- Digital forensic and machine learning / Poonkodi Mariappan, Padhmavathi B., Talluri Srinivasa Teja -- Effective recognition of stereo image concealed media of interpolation error with difference expansion / Hemalatha J., Kavitha Devi M. K. -- Mobile malware / Geogen G., Poovammal E. -- Network intrusion detection and prevention systems on flooding and worm attacks / P. Vetrivelan, M. Jagannath, T. S. Pradeep Kumar -- A systematic mapping of security mechanisms / Gayathri RajaKumaran, NeelaNarayanan Venkataraman -- | |
505 | 8 | |a Understanding anti-forensics techniques for combating digital security breaches and criminal activity / Ricardo Marques, Alexandre Mota, Lia Mota -- Visual cryptography for securing images in cloud / Punithavathi P, Geetha Subbiah -- Visual sensor networks: critical infrastructure protection / Suseela G, Asnath Victy Phamila Y. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 06/18/2016). | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer security. | |
653 | |a Cloud forensics | ||
653 | |a Criminal profiling | ||
653 | |a Cyber culture | ||
653 | |a Cyber warfare | ||
653 | |a Digital ethics | ||
653 | |a Digital evidence | ||
653 | |a Network forensics | ||
700 | 1 | |a Geetha, S. |d 1979- |e editor. | |
700 | 1 | |a Phamila, Asnath Victy |d 1978- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2016003151 | |
776 | 0 | 8 | |i Print version: |z 1522501932 |z 9781522501930 |w (DLC) 2016003151 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00142203 |
---|---|
_version_ | 1816797077030567936 |
adam_text | |
any_adam_object | |
author2 | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
author2_role | edt edt |
author2_variant | s g sg a v p av avp |
author_facet | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 .C6495 2016e |
callnumber-search | HV6773 .C6495 2016e |
callnumber-sort | HV 46773 C6495 42016E |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB |
contents | A review on digital sphere threats and vulnerabilities / Muthuramalingam S., Thangavel M., Sridhar S. -- Advances in biometrics for secure human authentication system: biometric authentication system / Jagannath Mohan, Adalarasu Kanagasabai, Vetrivelan Pandu -- Against spoofing attacks in network layer / Kavisankar L., Chellappan C., Poovammal E. -- Classification of cybercrimes and punishments under the Information Technology Act, 2000 / Sree Krishna Bharadwaj H. -- Cloud crime and fraud: a study of challenges for cloud security and forensics / Nimisha Singh -- Combating cyber security breaches in digital world using misuse detection methods: misuse detection / Subbulakshmi T. -- Critical video surveillance and identification of human behavior analysis of ATM security systems / M. Sivabalakrishnan, R. Menaka, S. Jeeva -- Digital evidence in practice: procedure and tools / Uma N. Dulhare, Shaik Rasool -- Digital forensic and machine learning / Poonkodi Mariappan, Padhmavathi B., Talluri Srinivasa Teja -- Effective recognition of stereo image concealed media of interpolation error with difference expansion / Hemalatha J., Kavitha Devi M. K. -- Mobile malware / Geogen G., Poovammal E. -- Network intrusion detection and prevention systems on flooding and worm attacks / P. Vetrivelan, M. Jagannath, T. S. Pradeep Kumar -- A systematic mapping of security mechanisms / Gayathri RajaKumaran, NeelaNarayanan Venkataraman -- Understanding anti-forensics techniques for combating digital security breaches and criminal activity / Ricardo Marques, Alexandre Mota, Lia Mota -- Visual cryptography for securing images in cloud / Punithavathi P, Geetha Subbiah -- Visual sensor networks: critical infrastructure protection / Suseela G, Asnath Victy Phamila Y. |
ctrlnum | (CaBNVSL)gtp00565985 (OCoLC)951975241 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04036nam a2200553 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00142203</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20160623164329.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">160618s2016 paua fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2016003151</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522501947</subfield><subfield code="q">electronic</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522501930</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-0193-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00565985</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)951975241</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773</subfield><subfield code="b">.C6495 2016e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Combating security breaches and criminal activity in the digital sphere </subfield><subfield code="c">S. Geetha and Asnath Victy Phamila, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">PDFs (309 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">A review on digital sphere threats and vulnerabilities / Muthuramalingam S., Thangavel M., Sridhar S. -- Advances in biometrics for secure human authentication system: biometric authentication system / Jagannath Mohan, Adalarasu Kanagasabai, Vetrivelan Pandu -- Against spoofing attacks in network layer / Kavisankar L., Chellappan C., Poovammal E. -- Classification of cybercrimes and punishments under the Information Technology Act, 2000 / Sree Krishna Bharadwaj H. -- Cloud crime and fraud: a study of challenges for cloud security and forensics / Nimisha Singh -- Combating cyber security breaches in digital world using misuse detection methods: misuse detection / Subbulakshmi T. -- Critical video surveillance and identification of human behavior analysis of ATM security systems / M. Sivabalakrishnan, R. Menaka, S. Jeeva -- Digital evidence in practice: procedure and tools / Uma N. Dulhare, Shaik Rasool -- Digital forensic and machine learning / Poonkodi Mariappan, Padhmavathi B., Talluri Srinivasa Teja -- Effective recognition of stereo image concealed media of interpolation error with difference expansion / Hemalatha J., Kavitha Devi M. K. -- Mobile malware / Geogen G., Poovammal E. -- Network intrusion detection and prevention systems on flooding and worm attacks / P. Vetrivelan, M. Jagannath, T. S. Pradeep Kumar -- A systematic mapping of security mechanisms / Gayathri RajaKumaran, NeelaNarayanan Venkataraman -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Understanding anti-forensics techniques for combating digital security breaches and criminal activity / Ricardo Marques, Alexandre Mota, Lia Mota -- Visual cryptography for securing images in cloud / Punithavathi P, Geetha Subbiah -- Visual sensor networks: critical infrastructure protection / Suseela G, Asnath Victy Phamila Y.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 06/18/2016).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud forensics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Criminal profiling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber culture</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber warfare</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital ethics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital evidence</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network forensics</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Geetha, S.</subfield><subfield code="d">1979-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phamila, Asnath Victy</subfield><subfield code="d">1978-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2016003151</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522501932</subfield><subfield code="z">9781522501930</subfield><subfield code="w">(DLC) 2016003151</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00142203 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:51:50Z |
institution | BVB |
isbn | 9781522501947 |
language | English |
oclc_num | 951975241 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | PDFs (309 pages) : illustrations. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IGI Global, |
record_format | marc |
spelling | Combating security breaches and criminal activity in the digital sphere S. Geetha and Asnath Victy Phamila, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016] PDFs (309 pages) : illustrations. text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. A review on digital sphere threats and vulnerabilities / Muthuramalingam S., Thangavel M., Sridhar S. -- Advances in biometrics for secure human authentication system: biometric authentication system / Jagannath Mohan, Adalarasu Kanagasabai, Vetrivelan Pandu -- Against spoofing attacks in network layer / Kavisankar L., Chellappan C., Poovammal E. -- Classification of cybercrimes and punishments under the Information Technology Act, 2000 / Sree Krishna Bharadwaj H. -- Cloud crime and fraud: a study of challenges for cloud security and forensics / Nimisha Singh -- Combating cyber security breaches in digital world using misuse detection methods: misuse detection / Subbulakshmi T. -- Critical video surveillance and identification of human behavior analysis of ATM security systems / M. Sivabalakrishnan, R. Menaka, S. Jeeva -- Digital evidence in practice: procedure and tools / Uma N. Dulhare, Shaik Rasool -- Digital forensic and machine learning / Poonkodi Mariappan, Padhmavathi B., Talluri Srinivasa Teja -- Effective recognition of stereo image concealed media of interpolation error with difference expansion / Hemalatha J., Kavitha Devi M. K. -- Mobile malware / Geogen G., Poovammal E. -- Network intrusion detection and prevention systems on flooding and worm attacks / P. Vetrivelan, M. Jagannath, T. S. Pradeep Kumar -- A systematic mapping of security mechanisms / Gayathri RajaKumaran, NeelaNarayanan Venkataraman -- Understanding anti-forensics techniques for combating digital security breaches and criminal activity / Ricardo Marques, Alexandre Mota, Lia Mota -- Visual cryptography for securing images in cloud / Punithavathi P, Geetha Subbiah -- Visual sensor networks: critical infrastructure protection / Suseela G, Asnath Victy Phamila Y. Restricted to subscribers or individual electronic text purchasers. "This book is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 06/18/2016). Computer crimes Prevention. Computer security. Cloud forensics Criminal profiling Cyber culture Cyber warfare Digital ethics Digital evidence Network forensics Geetha, S. 1979- editor. Phamila, Asnath Victy 1978- editor. IGI Global, publisher. (Original) (DLC)2016003151 Print version: 1522501932 9781522501930 (DLC) 2016003151 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 Volltext |
spellingShingle | Combating security breaches and criminal activity in the digital sphere A review on digital sphere threats and vulnerabilities / Muthuramalingam S., Thangavel M., Sridhar S. -- Advances in biometrics for secure human authentication system: biometric authentication system / Jagannath Mohan, Adalarasu Kanagasabai, Vetrivelan Pandu -- Against spoofing attacks in network layer / Kavisankar L., Chellappan C., Poovammal E. -- Classification of cybercrimes and punishments under the Information Technology Act, 2000 / Sree Krishna Bharadwaj H. -- Cloud crime and fraud: a study of challenges for cloud security and forensics / Nimisha Singh -- Combating cyber security breaches in digital world using misuse detection methods: misuse detection / Subbulakshmi T. -- Critical video surveillance and identification of human behavior analysis of ATM security systems / M. Sivabalakrishnan, R. Menaka, S. Jeeva -- Digital evidence in practice: procedure and tools / Uma N. Dulhare, Shaik Rasool -- Digital forensic and machine learning / Poonkodi Mariappan, Padhmavathi B., Talluri Srinivasa Teja -- Effective recognition of stereo image concealed media of interpolation error with difference expansion / Hemalatha J., Kavitha Devi M. K. -- Mobile malware / Geogen G., Poovammal E. -- Network intrusion detection and prevention systems on flooding and worm attacks / P. Vetrivelan, M. Jagannath, T. S. Pradeep Kumar -- A systematic mapping of security mechanisms / Gayathri RajaKumaran, NeelaNarayanan Venkataraman -- Understanding anti-forensics techniques for combating digital security breaches and criminal activity / Ricardo Marques, Alexandre Mota, Lia Mota -- Visual cryptography for securing images in cloud / Punithavathi P, Geetha Subbiah -- Visual sensor networks: critical infrastructure protection / Suseela G, Asnath Victy Phamila Y. Computer crimes Prevention. Computer security. |
title | Combating security breaches and criminal activity in the digital sphere |
title_auth | Combating security breaches and criminal activity in the digital sphere |
title_exact_search | Combating security breaches and criminal activity in the digital sphere |
title_full | Combating security breaches and criminal activity in the digital sphere S. Geetha and Asnath Victy Phamila, editors. |
title_fullStr | Combating security breaches and criminal activity in the digital sphere S. Geetha and Asnath Victy Phamila, editors. |
title_full_unstemmed | Combating security breaches and criminal activity in the digital sphere S. Geetha and Asnath Victy Phamila, editors. |
title_short | Combating security breaches and criminal activity in the digital sphere |
title_sort | combating security breaches and criminal activity in the digital sphere |
topic | Computer crimes Prevention. Computer security. |
topic_facet | Computer crimes Prevention. Computer security. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |
work_keys_str_mv | AT geethas combatingsecuritybreachesandcriminalactivityinthedigitalsphere AT phamilaasnathvicty combatingsecuritybreachesandcriminalactivityinthedigitalsphere AT igiglobal combatingsecuritybreachesandcriminalactivityinthedigitalsphere |