語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Multimedia forensics and securityfou...
~
Hassanien, Aboul Ella.
Multimedia forensics and securityfoundations, innovations, and applications /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Multimedia forensics and securityedited by Aboul Ella Hassanien ... [et al.].
其他題名:
foundations, innovations, and applications /
其他作者:
Hassanien, Aboul Ella.
出版者:
Cham :Springer International Publishing :2017.
面頁冊數:
xi, 414 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer crimesInvestigation.
電子資源:
http://dx.doi.org/10.1007/978-3-319-44270-9
ISBN:
9783319442709$q(electronic bk.)
Multimedia forensics and securityfoundations, innovations, and applications /
Multimedia forensics and security
foundations, innovations, and applications /[electronic resource] :edited by Aboul Ella Hassanien ... [et al.]. - Cham :Springer International Publishing :2017. - xi, 414 p. :ill., digital ;24 cm. - Intelligent systems reference library,v.1151868-4394 ;. - Intelligent systems reference library ;v.24..
Part 1: Forensic Analysis in Cloud Computing -- Part 2: Forensics Multimedia and Watermarking Techniques -- Part 3: Digital Forensic Applications.
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
ISBN: 9783319442709$q(electronic bk.)
Standard No.: 10.1007/978-3-319-44270-9doiSubjects--Topical Terms:
203448
Computer crimes
--Investigation.
LC Class. No.: QA76.575 / .M85 2017
Dewey Class. No.: 005.8
Multimedia forensics and securityfoundations, innovations, and applications /
LDR
:02256nmm a2200325 a 4500
001
507919
003
DE-He213
005
20161017164040.0
006
m d
007
cr nn 008maaau
008
171031s2017 gw s 0 eng d
020
$a
9783319442709$q(electronic bk.)
020
$a
9783319442686$q(paper)
024
7
$a
10.1007/978-3-319-44270-9
$2
doi
035
$a
978-3-319-44270-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.575
$b
.M85 2017
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.575
$b
.M961 2017
245
0 0
$a
Multimedia forensics and security
$h
[electronic resource] :
$b
foundations, innovations, and applications /
$c
edited by Aboul Ella Hassanien ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
xi, 414 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Intelligent systems reference library,
$x
1868-4394 ;
$v
v.115
505
0
$a
Part 1: Forensic Analysis in Cloud Computing -- Part 2: Forensics Multimedia and Watermarking Techniques -- Part 3: Digital Forensic Applications.
520
$a
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
650
0
$a
Computer crimes
$x
Investigation.
$3
203448
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Data protection.
$3
202312
650
0
$a
Forensic sciences.
$3
230960
650
0
$a
Multimedia systems
$x
Security measures.
$3
237902
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Computational Intelligence.
$3
338479
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
252959
650
2 4
$a
Forensic Medicine.
$3
273842
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Security Science and Technology.
$3
510148
700
1
$a
Hassanien, Aboul Ella.
$3
266212
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Intelligent systems reference library ;
$v
v.24.
$3
558591
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-44270-9
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000136162
電子館藏
1圖書
電子書
EB QA76.575 M961 2017
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-3-319-44270-9
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入