Critical concepts, standards, and techniques in cyber forensics:
"This book explores critical concepts, standards, and techniques in cyber forensics. It also examines the software used in cyber forensics"--Provided by publisher.
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schriftenreihe: | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores critical concepts, standards, and techniques in cyber forensics. It also examines the software used in cyber forensics"--Provided by publisher. |
Beschreibung: | 23 PDFs (xxiii, 292 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1799815609 9781799815600 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00233673 | ||
003 | IGIG | ||
005 | 20200131141803.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 200132s2020 pau fob 001 0 eng d | ||
010 | |z 2019031654 | ||
020 | |a 1799815609 |q electronic book | ||
020 | |a 9781799815600 |q electronic book | ||
020 | |z 9781799815587 |q hardcover | ||
020 | |z 9781799815594 |q paperback | ||
024 | 7 | |a 10.4018/978-1-7998-1558-7 |2 doi | |
035 | |a (CaBNVSL)slc00000246 | ||
035 | |a (OCoLC)1128889406 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HV8079.C65 |b C75 2020e | |
082 | 7 | |a 363.25/968 |2 23 | |
245 | 0 | 0 | |a Critical concepts, standards, and techniques in cyber forensics |c [edited by] Mohammad Shahid Husain, Mohammad Zunnun Khan. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 23 PDFs (xxiii, 292 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Cyber forensics: its importance, cyber forensics techniques, and tools -- Chapter 2. Cyber forensics evolution and its goals -- Chapter 3. Current challenges of digital forensics in cyber security -- Chapter 4. Trends in malware attacks: identification and mitigation strategies -- Chapter 5. Digital terrorism attack: types, effects, and prevention -- Chapter 6. Development and various critical testing operational frameworks in data acquisition for cyber forensics -- Chapter 7. Cyber forensic lab setup and its requirement -- Chapter 8. Digital crime evidence -- Chapter 9. Digital steganography security -- Chapter 10. Introduction to email, web, and message forensics -- Chapter 11. Financial statement fraud detection and investigation in digital environment -- Chapter 12. A compendium of cloud forensics -- Chapter 13. Application of machine learning In forensic science -- Chapter 14. Digital forensics and data mining -- Chapter 15. Forensic case studies. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores critical concepts, standards, and techniques in cyber forensics. It also examines the software used in cyber forensics"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 01/32/2020). | ||
650 | 0 | |a Computer crimes |x Investigation. | |
650 | 7 | |a Computer crimes |x Investigation. |2 fast | |
700 | 1 | |a Husain, Mohammad Shahid |d 1981- |e editor. | |
700 | 1 | |a Khan, Mohammad Zunnun |d 1988- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019031654 | |
776 | 0 | 8 | |i Print version: |z 1799815587 |z 9781799815587 |w (DLC) 2019031654 |
830 | 0 | |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series. | |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1558-7 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00233673 |
---|---|
_version_ | 1804751459944759296 |
adam_text | |
any_adam_object | |
author2 | Husain, Mohammad Shahid 1981- Khan, Mohammad Zunnun 1988- |
author2_role | edt edt |
author2_variant | m s h ms msh m z k mz mzk |
author_facet | Husain, Mohammad Shahid 1981- Khan, Mohammad Zunnun 1988- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 C75 2020e |
callnumber-search | HV8079.C65 C75 2020e |
callnumber-sort | HV 48079 C65 C75 42020E |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB |
contents | Chapter 1. Cyber forensics: its importance, cyber forensics techniques, and tools -- Chapter 2. Cyber forensics evolution and its goals -- Chapter 3. Current challenges of digital forensics in cyber security -- Chapter 4. Trends in malware attacks: identification and mitigation strategies -- Chapter 5. Digital terrorism attack: types, effects, and prevention -- Chapter 6. Development and various critical testing operational frameworks in data acquisition for cyber forensics -- Chapter 7. Cyber forensic lab setup and its requirement -- Chapter 8. Digital crime evidence -- Chapter 9. Digital steganography security -- Chapter 10. Introduction to email, web, and message forensics -- Chapter 11. Financial statement fraud detection and investigation in digital environment -- Chapter 12. A compendium of cloud forensics -- Chapter 13. Application of machine learning In forensic science -- Chapter 14. Digital forensics and data mining -- Chapter 15. Forensic case studies. |
ctrlnum | (CaBNVSL)slc00000246 (OCoLC)1128889406 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03223nam a2200505 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00233673</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20200131141803.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">200132s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019031654</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799815609</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799815600</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799815587</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799815594</subfield><subfield code="q">paperback</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-1558-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000246</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1128889406</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">C75 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Critical concepts, standards, and techniques in cyber forensics </subfield><subfield code="c">[edited by] Mohammad Shahid Husain, Mohammad Zunnun Khan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">23 PDFs (xxiii, 292 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Cyber forensics: its importance, cyber forensics techniques, and tools -- Chapter 2. Cyber forensics evolution and its goals -- Chapter 3. Current challenges of digital forensics in cyber security -- Chapter 4. Trends in malware attacks: identification and mitigation strategies -- Chapter 5. Digital terrorism attack: types, effects, and prevention -- Chapter 6. Development and various critical testing operational frameworks in data acquisition for cyber forensics -- Chapter 7. Cyber forensic lab setup and its requirement -- Chapter 8. Digital crime evidence -- Chapter 9. Digital steganography security -- Chapter 10. Introduction to email, web, and message forensics -- Chapter 11. Financial statement fraud detection and investigation in digital environment -- Chapter 12. A compendium of cloud forensics -- Chapter 13. Application of machine learning In forensic science -- Chapter 14. Digital forensics and data mining -- Chapter 15. Forensic case studies.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores critical concepts, standards, and techniques in cyber forensics. It also examines the software used in cyber forensics"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/32/2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Husain, Mohammad Shahid</subfield><subfield code="d">1981-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Mohammad Zunnun</subfield><subfield code="d">1988-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019031654</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799815587</subfield><subfield code="z">9781799815587</subfield><subfield code="w">(DLC) 2019031654</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1558-7</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00233673 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:54Z |
institution | BVB |
isbn | 1799815609 9781799815600 |
language | English |
oclc_num | 1128889406 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 23 PDFs (xxiii, 292 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global, |
record_format | marc |
series | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series. |
series2 | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series |
spelling | Critical concepts, standards, and techniques in cyber forensics [edited by] Mohammad Shahid Husain, Mohammad Zunnun Khan. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 23 PDFs (xxiii, 292 pages) text rdacontent electronic isbdmedia online resource rdacarrier Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series Includes bibliographical references and index. Chapter 1. Cyber forensics: its importance, cyber forensics techniques, and tools -- Chapter 2. Cyber forensics evolution and its goals -- Chapter 3. Current challenges of digital forensics in cyber security -- Chapter 4. Trends in malware attacks: identification and mitigation strategies -- Chapter 5. Digital terrorism attack: types, effects, and prevention -- Chapter 6. Development and various critical testing operational frameworks in data acquisition for cyber forensics -- Chapter 7. Cyber forensic lab setup and its requirement -- Chapter 8. Digital crime evidence -- Chapter 9. Digital steganography security -- Chapter 10. Introduction to email, web, and message forensics -- Chapter 11. Financial statement fraud detection and investigation in digital environment -- Chapter 12. A compendium of cloud forensics -- Chapter 13. Application of machine learning In forensic science -- Chapter 14. Digital forensics and data mining -- Chapter 15. Forensic case studies. Restricted to subscribers or individual electronic text purchasers. "This book explores critical concepts, standards, and techniques in cyber forensics. It also examines the software used in cyber forensics"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 01/32/2020). Computer crimes Investigation. Computer crimes Investigation. fast Husain, Mohammad Shahid 1981- editor. Khan, Mohammad Zunnun 1988- editor. IGI Global, publisher. (Original) (DLC)2019031654 Print version: 1799815587 9781799815587 (DLC) 2019031654 Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series. FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1558-7 Volltext |
spellingShingle | Critical concepts, standards, and techniques in cyber forensics Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series. Chapter 1. Cyber forensics: its importance, cyber forensics techniques, and tools -- Chapter 2. Cyber forensics evolution and its goals -- Chapter 3. Current challenges of digital forensics in cyber security -- Chapter 4. Trends in malware attacks: identification and mitigation strategies -- Chapter 5. Digital terrorism attack: types, effects, and prevention -- Chapter 6. Development and various critical testing operational frameworks in data acquisition for cyber forensics -- Chapter 7. Cyber forensic lab setup and its requirement -- Chapter 8. Digital crime evidence -- Chapter 9. Digital steganography security -- Chapter 10. Introduction to email, web, and message forensics -- Chapter 11. Financial statement fraud detection and investigation in digital environment -- Chapter 12. A compendium of cloud forensics -- Chapter 13. Application of machine learning In forensic science -- Chapter 14. Digital forensics and data mining -- Chapter 15. Forensic case studies. Computer crimes Investigation. Computer crimes Investigation. fast |
title | Critical concepts, standards, and techniques in cyber forensics |
title_auth | Critical concepts, standards, and techniques in cyber forensics |
title_exact_search | Critical concepts, standards, and techniques in cyber forensics |
title_full | Critical concepts, standards, and techniques in cyber forensics [edited by] Mohammad Shahid Husain, Mohammad Zunnun Khan. |
title_fullStr | Critical concepts, standards, and techniques in cyber forensics [edited by] Mohammad Shahid Husain, Mohammad Zunnun Khan. |
title_full_unstemmed | Critical concepts, standards, and techniques in cyber forensics [edited by] Mohammad Shahid Husain, Mohammad Zunnun Khan. |
title_short | Critical concepts, standards, and techniques in cyber forensics |
title_sort | critical concepts standards and techniques in cyber forensics |
topic | Computer crimes Investigation. Computer crimes Investigation. fast |
topic_facet | Computer crimes Investigation. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1558-7 |
work_keys_str_mv | AT husainmohammadshahid criticalconceptsstandardsandtechniquesincyberforensics AT khanmohammadzunnun criticalconceptsstandardsandtechniquesincyberforensics AT igiglobal criticalconceptsstandardsandtechniquesincyberforensics |