Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Forensic investigations and risk man...
~
Agarwal, Basant.
Forensic investigations and risk management in mobile and wireless communications
Record Type:
Electronic resources : Monograph/item
Title/Author:
Forensic investigations and risk management in mobile and wireless communicationsKavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors.
other author:
Sharma, Kavita,
Published:
Hershey, Pennsylvania :IGI Global,2020.
Description:
1 online resource (xxii, 314 p.)
Subject:
Mobile device forensics.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0
ISBN:
9781522595564 (ebk.)
Forensic investigations and risk management in mobile and wireless communications
Forensic investigations and risk management in mobile and wireless communications
[electronic resource] /Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. - Hershey, Pennsylvania :IGI Global,2020. - 1 online resource (xxii, 314 p.)
Includes bibliographical references and index.
Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks.
"This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"--
ISBN: 9781522595564 (ebk.)Subjects--Topical Terms:
723291
Mobile device forensics.
LC Class. No.: TK5103.4837 / .F67 2020e
Dewey Class. No.: 363.25/2
Forensic investigations and risk management in mobile and wireless communications
LDR
:02199nmm a2200265 a 4500
001
603441
003
IGIG
005
20211015164054.0
006
m o d
007
cr cn
008
211118s2019 pau fob 001 0 eng d
020
$a
9781522595564 (ebk.)
020
$a
9781522595540 (hbk.)
020
$a
9781522595557 (pbk.)
035
$a
(OCoLC)1111726034
035
$a
1101012105
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5103.4837
$b
.F67 2020e
082
0 0
$a
363.25/2
$2
23
245
0 0
$a
Forensic investigations and risk management in mobile and wireless communications
$h
[electronic resource] /
$c
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2020.
300
$a
1 online resource (xxii, 314 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks.
520
3
$a
"This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"--
$c
Provided by publisher.
650
0
$a
Mobile device forensics.
$3
723291
650
0
$a
Digital forensic science.
$3
818724
650
0
$a
Computer crimes
$x
Investigation.
$3
203448
700
1
$a
Sharma, Kavita,
$d
1985-
$3
899848
700
1
$a
Makino, Mitsunori.
$3
899849
700
1
$a
Shrivastava, Gulshan,
$d
1987-
$3
899850
700
1
$a
Agarwal, Basant.
$3
738691
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000202172
電子館藏
1圖書
電子書
EB TK5103.4837 .F67 2020e 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login