Forensic investigations and risk management in mobile and wireless communications:
"This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"--
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"-- |
Beschreibung: | 22 PDFs (314 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522595564 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00221870 | ||
003 | IGIG | ||
005 | 20191001134543.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190732s2019 pau fob 001 0 eng d | ||
010 | |z 2019003957 | ||
020 | |a 9781522595564 |q ebook | ||
020 | |z 9781522595540 |q hardcover | ||
020 | |z 9781522595557 |q softcover | ||
024 | 7 | |a 10.4018/978-1-5225-9554-0 |2 doi | |
035 | |a (CaBNVSL)slc20869906 | ||
035 | |a (OCoLC)1111726034 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5103.4837 |b .F67 2020e | |
082 | 7 | |a 363.25/2 |2 23 | |
245 | 0 | 0 | |a Forensic investigations and risk management in mobile and wireless communications |c Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c [2020] | |
300 | |a 22 PDFs (314 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | 0 | |a Description based on title screen (IGI Global, viewed 07/32/2019). | |
650 | 0 | |a Computer crimes |x Investigation. | |
650 | 0 | |a Digital forensic science. | |
650 | 0 | |a Mobile device forensics. | |
653 | |a Cloud Computing. | ||
653 | |a Cryptocurrency. | ||
653 | |a Cryptography. | ||
653 | |a Cyber Crime. | ||
653 | |a Data Extraction. | ||
653 | |a Digital Security. | ||
653 | |a Hacking. | ||
653 | |a Neural Networks. | ||
653 | |a Smartphone Security. | ||
653 | |a Social Media. | ||
700 | 1 | |a Agarwal, Basant |e editor. | |
700 | 1 | |a Makino, Mitsunori |e editor. | |
700 | 1 | |a Sharma, Kavita |d 1985- |e editor. | |
700 | 1 | |a Shrivastava, Gulshan |d 1987- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019003957 | |
776 | 0 | 8 | |i Print version: |z 1522595546 |z 9781522595540 |w (DLC) 2019003957 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00221870 |
---|---|
_version_ | 1826942596470013952 |
adam_text | |
any_adam_object | |
author2 | Agarwal, Basant Makino, Mitsunori Sharma, Kavita 1985- Shrivastava, Gulshan 1987- |
author2_role | edt edt edt edt |
author2_variant | b a ba m m mm k s ks g s gs |
author_facet | Agarwal, Basant Makino, Mitsunori Sharma, Kavita 1985- Shrivastava, Gulshan 1987- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.4837 .F67 2020e |
callnumber-search | TK5103.4837 .F67 2020e |
callnumber-sort | TK 45103.4837 F67 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks. |
ctrlnum | (CaBNVSL)slc20869906 (OCoLC)1111726034 |
dewey-full | 363.25/2 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/2 |
dewey-search | 363.25/2 |
dewey-sort | 3363.25 12 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03519nam a2200625 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00221870</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20191001134543.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190732s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019003957</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522595564</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522595540</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522595557</subfield><subfield code="q">softcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-9554-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20869906</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1111726034</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5103.4837</subfield><subfield code="b">.F67 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Forensic investigations and risk management in mobile and wireless communications </subfield><subfield code="c">Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">22 PDFs (314 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 07/32/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital forensic science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile device forensics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptocurrency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Crime.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Extraction.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Neural Networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smartphone Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social Media.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Basant</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Makino, Mitsunori</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharma, Kavita</subfield><subfield code="d">1985-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shrivastava, Gulshan</subfield><subfield code="d">1987-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019003957</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522595546</subfield><subfield code="z">9781522595540</subfield><subfield code="w">(DLC) 2019003957</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00221870 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:31Z |
institution | BVB |
isbn | 9781522595564 |
language | English |
oclc_num | 1111726034 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 22 PDFs (314 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Forensic investigations and risk management in mobile and wireless communications Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global [2020] 22 PDFs (314 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks. Restricted to subscribers or individual electronic text purchasers. "This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 07/32/2019). Computer crimes Investigation. Digital forensic science. Mobile device forensics. Cloud Computing. Cryptocurrency. Cryptography. Cyber Crime. Data Extraction. Digital Security. Hacking. Neural Networks. Smartphone Security. Social Media. Agarwal, Basant editor. Makino, Mitsunori editor. Sharma, Kavita 1985- editor. Shrivastava, Gulshan 1987- editor. IGI Global, publisher. (Original) (DLC)2019003957 Print version: 1522595546 9781522595540 (DLC) 2019003957 |
spellingShingle | Forensic investigations and risk management in mobile and wireless communications Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks. Computer crimes Investigation. Digital forensic science. Mobile device forensics. |
title | Forensic investigations and risk management in mobile and wireless communications |
title_auth | Forensic investigations and risk management in mobile and wireless communications |
title_exact_search | Forensic investigations and risk management in mobile and wireless communications |
title_full | Forensic investigations and risk management in mobile and wireless communications Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. |
title_fullStr | Forensic investigations and risk management in mobile and wireless communications Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. |
title_full_unstemmed | Forensic investigations and risk management in mobile and wireless communications Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. |
title_short | Forensic investigations and risk management in mobile and wireless communications |
title_sort | forensic investigations and risk management in mobile and wireless communications |
topic | Computer crimes Investigation. Digital forensic science. Mobile device forensics. |
topic_facet | Computer crimes Investigation. Digital forensic science. Mobile device forensics. |
work_keys_str_mv | AT agarwalbasant forensicinvestigationsandriskmanagementinmobileandwirelesscommunications AT makinomitsunori forensicinvestigationsandriskmanagementinmobileandwirelesscommunications AT sharmakavita forensicinvestigationsandriskmanagementinmobileandwirelesscommunications AT shrivastavagulshan forensicinvestigationsandriskmanagementinmobileandwirelesscommunications AT igiglobal forensicinvestigationsandriskmanagementinmobileandwirelesscommunications |