Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010225824 | QA76.9.A25 H364 2010 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
The widespread use of information and communications technology (ICT) has created a global platform for The exchange of ideas, goods and services, The benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. it is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, As our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals. This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, The public and private sectors, students and those who are interested in and will benefit from this handbook.
Table of Contents
Foreword | p. v |
1 OS and Network Security | p. 1 |
2 Authentication | p. 25 |
3 Classification of Attacks on Cryptographic Protocols | p. 47 |
4 Wi-Fi Security | p. 83 |
5 Auditing, Penetration Testing and Ethical Hacking | p. 93 |
6 VoIP Security Issues | p. 103 |
7 Secure by Design: Considering Security from the Early Stages of the Information Systems Development | p. 115 |
8 Online Transactions' Security | p. 133 |
9 Security and E-Accessibility of Online Banking | p. 155 |
10 Towards an Integrated Network Security Framework Using the Y-Comm Architecture | p. 169 |
11 Introduction to Behavioural Biometrics | p. 185 |
12 Information Security Management and Standards of Best Practice | p. 207 |
13 Security Risk Management Strategy | p. 237 |
14 Open Source Intelligence | p. 263 |
15 Digital Identity Management | p. 279 |
16 E-Security and Critical National Infrastructures | p. 295 |
17 Digital Forensics Techniques and Tools | p. 321 |
18 iPod, Cell and Smart Phone Forensics | p. 357 |
19 A Methodology for Smartphones Internal Memory Acquisition, Decoding and Analysis | p. 383 |
20 Analysis of E-Mail Headers | p. 395 |
21 Digital Evidence Manipulation Using Anti-Forensic Tools and Techniques | p. 411 |
22 Hidden Data and Steganography | p. 427 |
23 Cyberspace and Cybercrime | p. 455 |
24 Intellectual Property Rights: The Security Perspective | p. 477 |
25 Legal Issues on the Protection of Personal Data on the Internet | p. 497 |
26 Downloading Music: Legal Facts | p. 513 |
27 The Use of Electronic Surveillance in Conducting Criminal Investigations on the Internet | p. 525 |
28 The Legal Conflict Between Security and Privacy in Addressing Terrorism and Other Crime on the Internet | p. 553 |
29 Cybercrime | p. 573 |
30 Cybercrime: Innocent Victims and Their Plight for Justice | p. 585 |
31 Intelligent Decision Support Systems for Assistance in Forensic Investigation Processes | p. 603 |
32 Bioinformatics and Biometrics | p. 631 |
33 Criminal Data Mining | p. 657 |
Index | p. 693 |