Skip to:Content
|
Bottom
Cover image for Handbook of electronic security and digital forensics
Title:
Handbook of electronic security and digital forensics
Publication Information:
Singapore : World Scientific, 2010
Physical Description:
ix, 697 p. : ill. ; 26 cm.
ISBN:
9789812837035
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010225824 QA76.9.A25 H364 2010 Open Access Book Book
Searching...

On Order

Summary

Summary

The widespread use of information and communications technology (ICT) has created a global platform for The exchange of ideas, goods and services, The benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. it is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, As our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals. This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, The public and private sectors, students and those who are interested in and will benefit from this handbook.


Table of Contents

Roberto Di Pietro and Nino Vincenzo VerdeRoberto Di Pietro and Nino Vincenzo VerdeLuca Spalazzi and Simone TacconiSufian YousefFrank LeonhardtFrank LeonhardtHaralambos MouratidisJames KadirireHamid Jahankhani and Liaqat Ali and Hossein JahankhaniGlenford Mapp and Jon Crowcroft and Raphael PhanKenneth RevettTheo TryfonasHamid Jahankhani and Mathews Z. Nkhoma and Haralambos MouratidisDavid Lilburn WatsonElias PimenidisHoward ThompsonRoberto Di Pietro and Nino Vincenzo VerdeM. Mattiucci and R. Olivieri and L. Giampieri and S. Monfreda and G. FiniziaRosamaria Bertè and Fabio Dellutri and Antonio Grillo and Alessandro Lentini and Gianluigi Me and Vittorio OttavianiAlessandro Obino and Massimo BernaschiHamid Jahankhani and Elidon BeqiriDavid Lilburn WatsonVagelis PapakonstantinouVagelis PapakonstantinouEvi ChatziliassiHamid Jahankhani and Chris O. FolorunsoMurdoch WatneyMurdoch WatneyHamid Jahankhani and Ameer Al-NemratHamid Jahankhani and Kevin OrmeDale DzemydieneKenneth RevettViktoras Justickis
Forewordp. v
1 OS and Network Securityp. 1
2 Authenticationp. 25
3 Classification of Attacks on Cryptographic Protocolsp. 47
4 Wi-Fi Securityp. 83
5 Auditing, Penetration Testing and Ethical Hackingp. 93
6 VoIP Security Issuesp. 103
7 Secure by Design: Considering Security from the Early Stages of the Information Systems Developmentp. 115
8 Online Transactions' Securityp. 133
9 Security and E-Accessibility of Online Bankingp. 155
10 Towards an Integrated Network Security Framework Using the Y-Comm Architecturep. 169
11 Introduction to Behavioural Biometricsp. 185
12 Information Security Management and Standards of Best Practicep. 207
13 Security Risk Management Strategyp. 237
14 Open Source Intelligencep. 263
15 Digital Identity Managementp. 279
16 E-Security and Critical National Infrastructuresp. 295
17 Digital Forensics Techniques and Toolsp. 321
18 iPod, Cell and Smart Phone Forensicsp. 357
19 A Methodology for Smartphones Internal Memory Acquisition, Decoding and Analysisp. 383
20 Analysis of E-Mail Headersp. 395
21 Digital Evidence Manipulation Using Anti-Forensic Tools and Techniquesp. 411
22 Hidden Data and Steganographyp. 427
23 Cyberspace and Cybercrimep. 455
24 Intellectual Property Rights: The Security Perspectivep. 477
25 Legal Issues on the Protection of Personal Data on the Internetp. 497
26 Downloading Music: Legal Factsp. 513
27 The Use of Electronic Surveillance in Conducting Criminal Investigations on the Internetp. 525
28 The Legal Conflict Between Security and Privacy in Addressing Terrorism and Other Crime on the Internetp. 553
29 Cybercrimep. 573
30 Cybercrime: Innocent Victims and Their Plight for Justicep. 585
31 Intelligent Decision Support Systems for Assistance in Forensic Investigation Processesp. 603
32 Bioinformatics and Biometricsp. 631
33 Criminal Data Miningp. 657
Indexp. 693
Go to:Top of Page