Forensic investigations and risk management in mobile and wireless communications:
"This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"--
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"-- |
Beschreibung: | 22 PDFs (314 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522595564 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00221870 | ||
003 | IGIG | ||
005 | 20190731145918.0 | ||
006 | m e d | ||
007 | cr bn |||m|||a | ||
008 | 190732s2019 pau fob 001 0 eng d | ||
010 | |z 2019003957 | ||
020 | |a 9781522595564 |q ebook | ||
020 | |z 9781522595540 |q hardcover | ||
020 | |z 9781522595557 |q softcover | ||
024 | 7 | |a 10.4018/978-1-5225-9554-0 |2 doi | |
035 | |a (CaBNVSL)slc20869906 | ||
035 | |a (OCoLC)1111726034 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5103.4837 |b .F67 2020e | |
082 | 7 | |a 363.25/2 |2 23 | |
245 | 0 | 0 | |a Forensic investigations and risk management in mobile and wireless communications |c Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 22 PDFs (314 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 07/32/2019). | ||
650 | 0 | |a Computer crimes |x Investigation. | |
650 | 0 | |a Digital forensic science. | |
650 | 0 | |a Mobile device forensics. | |
700 | 1 | |a Agarwal, Basant, |e editor. | |
700 | 1 | |a Makino, Mitsunori, |e editor. | |
700 | 1 | |a Sharma, Kavita |d 1985- |e editor. | |
700 | 1 | |a Shrivastava, Gulshan |d 1987- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019003957 | |
776 | 0 | 8 | |i Print version: |z 1522595546 |z 9781522595540 |w (DLC) 2019003957 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00221870 |
---|---|
_version_ | 1816797081923223552 |
adam_text | |
any_adam_object | |
author2 | Agarwal, Basant Makino, Mitsunori Sharma, Kavita 1985- Shrivastava, Gulshan 1987- |
author2_role | edt edt edt edt |
author2_variant | b a ba m m mm k s ks g s gs |
author_facet | Agarwal, Basant Makino, Mitsunori Sharma, Kavita 1985- Shrivastava, Gulshan 1987- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.4837 .F67 2020e |
callnumber-search | TK5103.4837 .F67 2020e |
callnumber-sort | TK 45103.4837 F67 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks. |
ctrlnum | (CaBNVSL)slc20869906 (OCoLC)1111726034 |
dewey-full | 363.25/2 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/2 |
dewey-search | 363.25/2 |
dewey-sort | 3363.25 12 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03206nam a2200505 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00221870</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190731145918.0</controlfield><controlfield tag="006">m e d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190732s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019003957</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522595564</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522595540</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522595557</subfield><subfield code="q">softcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-9554-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20869906</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1111726034</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5103.4837</subfield><subfield code="b">.F67 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Forensic investigations and risk management in mobile and wireless communications </subfield><subfield code="c">Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">22 PDFs (314 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 07/32/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital forensic science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile device forensics.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Basant,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Makino, Mitsunori,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharma, Kavita</subfield><subfield code="d">1985-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shrivastava, Gulshan</subfield><subfield code="d">1987-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019003957</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522595546</subfield><subfield code="z">9781522595540</subfield><subfield code="w">(DLC) 2019003957</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00221870 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:55Z |
institution | BVB |
isbn | 9781522595564 |
language | English |
oclc_num | 1111726034 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 22 PDFs (314 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Forensic investigations and risk management in mobile and wireless communications Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 22 PDFs (314 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks. Restricted to subscribers or individual electronic text purchasers. "This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 07/32/2019). Computer crimes Investigation. Digital forensic science. Mobile device forensics. Agarwal, Basant, editor. Makino, Mitsunori, editor. Sharma, Kavita 1985- editor. Shrivastava, Gulshan 1987- editor. IGI Global, publisher. (Original) (DLC)2019003957 Print version: 1522595546 9781522595540 (DLC) 2019003957 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0 Volltext |
spellingShingle | Forensic investigations and risk management in mobile and wireless communications Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks. Computer crimes Investigation. Digital forensic science. Mobile device forensics. |
title | Forensic investigations and risk management in mobile and wireless communications |
title_auth | Forensic investigations and risk management in mobile and wireless communications |
title_exact_search | Forensic investigations and risk management in mobile and wireless communications |
title_full | Forensic investigations and risk management in mobile and wireless communications Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. |
title_fullStr | Forensic investigations and risk management in mobile and wireless communications Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. |
title_full_unstemmed | Forensic investigations and risk management in mobile and wireless communications Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. |
title_short | Forensic investigations and risk management in mobile and wireless communications |
title_sort | forensic investigations and risk management in mobile and wireless communications |
topic | Computer crimes Investigation. Digital forensic science. Mobile device forensics. |
topic_facet | Computer crimes Investigation. Digital forensic science. Mobile device forensics. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0 |
work_keys_str_mv | AT agarwalbasant forensicinvestigationsandriskmanagementinmobileandwirelesscommunications AT makinomitsunori forensicinvestigationsandriskmanagementinmobileandwirelesscommunications AT sharmakavita forensicinvestigationsandriskmanagementinmobileandwirelesscommunications AT shrivastavagulshan forensicinvestigationsandriskmanagementinmobileandwirelesscommunications AT igiglobal forensicinvestigationsandriskmanagementinmobileandwirelesscommunications |