Handbook of research on network forensics and analysis techniques:
"This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-s...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2018]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"-- |
Beschreibung: | 35 PDFs (xxxii, 509 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522541011 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00182673 | ||
003 | IGIG | ||
005 | 20180307141925.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 180308s2018 pau fob 001 0 eng d | ||
010 | |z 2017028583 | ||
020 | |a 9781522541011 |q ebook | ||
020 | |z 9781522541004 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-4100-4 |2 doi | |
035 | |a (CaBNVSL)slc19963339 | ||
035 | |a (OCoLC)1028071602 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HV8079.C65 |b H364 2018e | |
082 | 7 | |a 363.25/968 |2 23 | |
245 | 0 | 0 | |a Handbook of research on network forensics and analysis techniques |c Gulshan Shrivastava, B.B. Gupta, Suman Bala, Nilanjan Dey, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2018] | |
300 | |a 35 PDFs (xxxii, 509 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Security in network, social IoT and VANET, denial of service attack. Chapter 1. Wireless sensor networks: a technical survey ; Chapter 2. Network security: attacks and control in MANET ; Chapter 3. Cross-layer based intrusion detection and prevention for network ; Chapter 4. Security issues in web services ; Chapter 5. Flawed security of social network of things ; Chapter 6. Artificial intelligence based intrusion detection system to detect flooding attack in Vanets ; Chapter 7. Detection of Botnet based attacks on network: using machine learning techniques ; Chapter 8. Denial-of-service (DOS) attack and Botnet: network analysis, research tactics, and mitigation -- Section 2. Cyber crime and cyber forensics. Chapter 9. Role of cyber security and cyber forensics in India ; Chapter 10. Cyberattacks, cybercrime and cyberterrorism ; Chapter 11. Cyber crime toolkit development ; Chapter 12. On creating digital evidence in IP networks with Nettrack ; Chapter 13. Digital forensics in distributed environment ; Chapter 14. Successful computer forensics analysis on the cyber attack Botnet -- Section 3. Security and privacy in big data analytics and machine learning, biometrics, audio watermarking, and cryptocurrency. Chapter 15. Impact of big data on security ; Chapter 16. The impact of big data analytics and challenges to cyber security ; Chapter 17. Security and privacy challenges in big data environment ; Chapter 18. Impact of big data on security: big data security issues and defense schemes ; Chapter 19. A comparative review of various machine learning approaches for improving the performance of Stego anomaly detection ; Chapter 20. Audio watermarking with reduced number of random samples ; Chapter 21. Bitcoin: digital decentralized cryptocurrency ; Chapter 22. A robust biometrics system using finger knuckle print. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/08/2018). | ||
650 | 0 | |a Computer crimes |x Investigation. | |
650 | 0 | |a Computer networks |x Security measures. | |
700 | 1 | |a Bala, Suman, |e editor. | |
700 | 1 | |a Dey, Nilanjan |d 1984- |e editor. | |
700 | 1 | |a Gupta, B. B., |e editor. | |
700 | 1 | |a Kumar, Prabhat, |e editor. | |
700 | 1 | |a Shrivastava, Gulshan |d 1987- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2017028583 | |
776 | 0 | 8 | |i Print version: |z 1522541004 |z 9781522541004 |w (DLC) 2017028583 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00182673 |
---|---|
_version_ | 1804751456128991232 |
adam_text | |
any_adam_object | |
author2 | Bala, Suman Dey, Nilanjan 1984- Gupta, B. B. Kumar, Prabhat Shrivastava, Gulshan 1987- |
author2_role | edt edt edt edt edt |
author2_variant | s b sb n d nd b b g bb bbg p k pk g s gs |
author_facet | Bala, Suman Dey, Nilanjan 1984- Gupta, B. B. Kumar, Prabhat Shrivastava, Gulshan 1987- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 H364 2018e |
callnumber-search | HV8079.C65 H364 2018e |
callnumber-sort | HV 48079 C65 H364 42018E |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB |
contents | Section 1. Security in network, social IoT and VANET, denial of service attack. Chapter 1. Wireless sensor networks: a technical survey ; Chapter 2. Network security: attacks and control in MANET ; Chapter 3. Cross-layer based intrusion detection and prevention for network ; Chapter 4. Security issues in web services ; Chapter 5. Flawed security of social network of things ; Chapter 6. Artificial intelligence based intrusion detection system to detect flooding attack in Vanets ; Chapter 7. Detection of Botnet based attacks on network: using machine learning techniques ; Chapter 8. Denial-of-service (DOS) attack and Botnet: network analysis, research tactics, and mitigation -- Section 2. Cyber crime and cyber forensics. Chapter 9. Role of cyber security and cyber forensics in India ; Chapter 10. Cyberattacks, cybercrime and cyberterrorism ; Chapter 11. Cyber crime toolkit development ; Chapter 12. On creating digital evidence in IP networks with Nettrack ; Chapter 13. Digital forensics in distributed environment ; Chapter 14. Successful computer forensics analysis on the cyber attack Botnet -- Section 3. Security and privacy in big data analytics and machine learning, biometrics, audio watermarking, and cryptocurrency. Chapter 15. Impact of big data on security ; Chapter 16. The impact of big data analytics and challenges to cyber security ; Chapter 17. Security and privacy challenges in big data environment ; Chapter 18. Impact of big data on security: big data security issues and defense schemes ; Chapter 19. A comparative review of various machine learning approaches for improving the performance of Stego anomaly detection ; Chapter 20. Audio watermarking with reduced number of random samples ; Chapter 21. Bitcoin: digital decentralized cryptocurrency ; Chapter 22. A robust biometrics system using finger knuckle print. |
ctrlnum | (CaBNVSL)slc19963339 (OCoLC)1028071602 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04145nam a2200493 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00182673</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20180307141925.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">180308s2018 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2017028583</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522541011</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522541004</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-4100-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc19963339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1028071602</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">H364 2018e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on network forensics and analysis techniques </subfield><subfield code="c">Gulshan Shrivastava, B.B. Gupta, Suman Bala, Nilanjan Dey, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">35 PDFs (xxxii, 509 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Security in network, social IoT and VANET, denial of service attack. Chapter 1. Wireless sensor networks: a technical survey ; Chapter 2. Network security: attacks and control in MANET ; Chapter 3. Cross-layer based intrusion detection and prevention for network ; Chapter 4. Security issues in web services ; Chapter 5. Flawed security of social network of things ; Chapter 6. Artificial intelligence based intrusion detection system to detect flooding attack in Vanets ; Chapter 7. Detection of Botnet based attacks on network: using machine learning techniques ; Chapter 8. Denial-of-service (DOS) attack and Botnet: network analysis, research tactics, and mitigation -- Section 2. Cyber crime and cyber forensics. Chapter 9. Role of cyber security and cyber forensics in India ; Chapter 10. Cyberattacks, cybercrime and cyberterrorism ; Chapter 11. Cyber crime toolkit development ; Chapter 12. On creating digital evidence in IP networks with Nettrack ; Chapter 13. Digital forensics in distributed environment ; Chapter 14. Successful computer forensics analysis on the cyber attack Botnet -- Section 3. Security and privacy in big data analytics and machine learning, biometrics, audio watermarking, and cryptocurrency. Chapter 15. Impact of big data on security ; Chapter 16. The impact of big data analytics and challenges to cyber security ; Chapter 17. Security and privacy challenges in big data environment ; Chapter 18. Impact of big data on security: big data security issues and defense schemes ; Chapter 19. A comparative review of various machine learning approaches for improving the performance of Stego anomaly detection ; Chapter 20. Audio watermarking with reduced number of random samples ; Chapter 21. Bitcoin: digital decentralized cryptocurrency ; Chapter 22. A robust biometrics system using finger knuckle print.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/08/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bala, Suman,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dey, Nilanjan</subfield><subfield code="d">1984-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, B. B.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Prabhat,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shrivastava, Gulshan</subfield><subfield code="d">1987-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2017028583</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522541004</subfield><subfield code="z">9781522541004</subfield><subfield code="w">(DLC) 2017028583</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00182673 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:51Z |
institution | BVB |
isbn | 9781522541011 |
language | English |
oclc_num | 1028071602 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 35 PDFs (xxxii, 509 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on network forensics and analysis techniques Gulshan Shrivastava, B.B. Gupta, Suman Bala, Nilanjan Dey, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018] 35 PDFs (xxxii, 509 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. Security in network, social IoT and VANET, denial of service attack. Chapter 1. Wireless sensor networks: a technical survey ; Chapter 2. Network security: attacks and control in MANET ; Chapter 3. Cross-layer based intrusion detection and prevention for network ; Chapter 4. Security issues in web services ; Chapter 5. Flawed security of social network of things ; Chapter 6. Artificial intelligence based intrusion detection system to detect flooding attack in Vanets ; Chapter 7. Detection of Botnet based attacks on network: using machine learning techniques ; Chapter 8. Denial-of-service (DOS) attack and Botnet: network analysis, research tactics, and mitigation -- Section 2. Cyber crime and cyber forensics. Chapter 9. Role of cyber security and cyber forensics in India ; Chapter 10. Cyberattacks, cybercrime and cyberterrorism ; Chapter 11. Cyber crime toolkit development ; Chapter 12. On creating digital evidence in IP networks with Nettrack ; Chapter 13. Digital forensics in distributed environment ; Chapter 14. Successful computer forensics analysis on the cyber attack Botnet -- Section 3. Security and privacy in big data analytics and machine learning, biometrics, audio watermarking, and cryptocurrency. Chapter 15. Impact of big data on security ; Chapter 16. The impact of big data analytics and challenges to cyber security ; Chapter 17. Security and privacy challenges in big data environment ; Chapter 18. Impact of big data on security: big data security issues and defense schemes ; Chapter 19. A comparative review of various machine learning approaches for improving the performance of Stego anomaly detection ; Chapter 20. Audio watermarking with reduced number of random samples ; Chapter 21. Bitcoin: digital decentralized cryptocurrency ; Chapter 22. A robust biometrics system using finger knuckle print. Restricted to subscribers or individual electronic text purchasers. "This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/08/2018). Computer crimes Investigation. Computer networks Security measures. Bala, Suman, editor. Dey, Nilanjan 1984- editor. Gupta, B. B., editor. Kumar, Prabhat, editor. Shrivastava, Gulshan 1987- editor. IGI Global, publisher. (Original) (DLC)2017028583 Print version: 1522541004 9781522541004 (DLC) 2017028583 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4 Volltext |
spellingShingle | Handbook of research on network forensics and analysis techniques Section 1. Security in network, social IoT and VANET, denial of service attack. Chapter 1. Wireless sensor networks: a technical survey ; Chapter 2. Network security: attacks and control in MANET ; Chapter 3. Cross-layer based intrusion detection and prevention for network ; Chapter 4. Security issues in web services ; Chapter 5. Flawed security of social network of things ; Chapter 6. Artificial intelligence based intrusion detection system to detect flooding attack in Vanets ; Chapter 7. Detection of Botnet based attacks on network: using machine learning techniques ; Chapter 8. Denial-of-service (DOS) attack and Botnet: network analysis, research tactics, and mitigation -- Section 2. Cyber crime and cyber forensics. Chapter 9. Role of cyber security and cyber forensics in India ; Chapter 10. Cyberattacks, cybercrime and cyberterrorism ; Chapter 11. Cyber crime toolkit development ; Chapter 12. On creating digital evidence in IP networks with Nettrack ; Chapter 13. Digital forensics in distributed environment ; Chapter 14. Successful computer forensics analysis on the cyber attack Botnet -- Section 3. Security and privacy in big data analytics and machine learning, biometrics, audio watermarking, and cryptocurrency. Chapter 15. Impact of big data on security ; Chapter 16. The impact of big data analytics and challenges to cyber security ; Chapter 17. Security and privacy challenges in big data environment ; Chapter 18. Impact of big data on security: big data security issues and defense schemes ; Chapter 19. A comparative review of various machine learning approaches for improving the performance of Stego anomaly detection ; Chapter 20. Audio watermarking with reduced number of random samples ; Chapter 21. Bitcoin: digital decentralized cryptocurrency ; Chapter 22. A robust biometrics system using finger knuckle print. Computer crimes Investigation. Computer networks Security measures. |
title | Handbook of research on network forensics and analysis techniques |
title_auth | Handbook of research on network forensics and analysis techniques |
title_exact_search | Handbook of research on network forensics and analysis techniques |
title_full | Handbook of research on network forensics and analysis techniques Gulshan Shrivastava, B.B. Gupta, Suman Bala, Nilanjan Dey, editors. |
title_fullStr | Handbook of research on network forensics and analysis techniques Gulshan Shrivastava, B.B. Gupta, Suman Bala, Nilanjan Dey, editors. |
title_full_unstemmed | Handbook of research on network forensics and analysis techniques Gulshan Shrivastava, B.B. Gupta, Suman Bala, Nilanjan Dey, editors. |
title_short | Handbook of research on network forensics and analysis techniques |
title_sort | handbook of research on network forensics and analysis techniques |
topic | Computer crimes Investigation. Computer networks Security measures. |
topic_facet | Computer crimes Investigation. Computer networks Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4 |
work_keys_str_mv | AT balasuman handbookofresearchonnetworkforensicsandanalysistechniques AT deynilanjan handbookofresearchonnetworkforensicsandanalysistechniques AT guptabb handbookofresearchonnetworkforensicsandanalysistechniques AT kumarprabhat handbookofresearchonnetworkforensicsandanalysistechniques AT shrivastavagulshan handbookofresearchonnetworkforensicsandanalysistechniques AT igiglobal handbookofresearchonnetworkforensicsandanalysistechniques |