|
|
|
|
LEADER |
03614cam a2200301 a 4500 |
001 |
25794 |
003 |
DLC |
005 |
20110923105735.0 |
008 |
110120s2011 paua b 001 0 eng |
010 |
# |
# |
|a 2011000066
|
020 |
# |
# |
|a 9781609605155 (hardcover)
|
020 |
# |
# |
|a 9781609605162 (ebook)
|
040 |
# |
# |
|a DLC
|c DLC
|d DLC
|
042 |
# |
# |
|a pcc
|
050 |
# |
# |
|a HV8073
|b .N468 2011
|
245 |
# |
# |
|a New technologies for digital crime and forensics :
|b devices, applications, and software /
|c [edited by] Chang-Tsun Li and Anthony T.S. Ho.
|
260 |
# |
# |
|a Hershey, PA :
|b Information Science Reference,
|c c2011.
|
300 |
# |
# |
|a xxiv, 347 p. :
|b ill. ;
|c 29 cm.
|
500 |
# |
# |
|a "Premier reference source"--Cover.
|
504 |
# |
# |
|a Includes bibliographical references and index.
|
505 |
# |
# |
|a Digital evidence -- Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools / Simson Garfinkel -- Voice over IP : privacy and forensic implications / Jill Slay, Matthew Simon -- Volatile memory collection and analysis for windows mission-critical computer systems / Antonio Savoldi, Paolo Gubian -- Evidentiary implications of potential security weaknesses in forensic software / Chris Ridder -- Combating internet-based crime -- Methods to identify spammers / Tobias Eggendorfer -- Spam image clustering for identifying common sources of unsolicited emails / Chengcui Zhang, Xin Chen, Wei-Bang Chen, Lin Yang, Gary Warner -- A model based approach to timestamp evidence interpretation / Svein Willassen -- Conducting forensic investigations of cyber attacks on automobile in-vehicle networks / Dennis Nilsson, Ulf Larson -- Dealing with multiple truths in online virtual worlds / Jan Sablatnig, Fritz Lehmann-Grube, Sven Grottke, Sabine Cikic -- Content protection through the use of extrinsic data -- Locally square distortion and batch steganographic capacity / Andrew Ker -- Efficient forensic analysis for anonymous attack in secure content distribution / Hongxia Jin -- Protection of digital mammograms on pacss using data hiding techniques / Chang-Tsun Li, Yue Li, Chia-Hung Wei -- Reversible and blind database watermarking using difference expansion / Gaurav Gupta, Josef Pieprzyk -- Medical images authentication through repetitive index modulation based watermarking / Chang-Tsun Li, Yue Li -- Application of pattern recognition and signal processing techniques to digital forecsics -- Unexpected artifacts in a digital photograph / Matthew Sorell -- Conditions for effective detection and identification of primary quantization of re-quantized jpeg images / Matthew Sorell -- Dynamic structural statistical model based online signature verification / Yan Chen, Xiaoqing Ding, Patrick Wang -- Efficient image
|
505 |
# |
# |
|a matching using local invariant features for copy detection / H.R. Chennamma, Lalitha Rangarajan, M.S. Rao -- Reliable motion detection, location and audit in surveillance video / Amirsaman Poursoltanmohammadi, Matthew Sorell -- Cancellable biometrics for on-line signature recognition / Emanuele Maiorana, Patrizio Campisi, Alessandro Neri.
|
520 |
# |
# |
|a "This book provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities"--Provided by publisher.
|
650 |
# |
# |
|a Criminal investigation
|x Technological innovations.
|
700 |
# |
# |
|a Li, Chang-Tsun.
|
700 |
# |
# |
|a Ho, Anthony T.S.,
|d 1958-
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-515-5
|z View fulltext via EzAccess
|