- Shopping Bag ( 0 items )
Other sellers (Hardcover)
-
All (6) from $203.37
-
New (5) from $203.37
-
Used (1) from $228.98
More About This Textbook
Overview
The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals.
This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.
Product Details
Table of Contents
Foreword v
1 OS and Network Security Roberto Di Pietro Nino Vincenzo Verde 1
2 Authentication Roberto Di Pietro Nino Vincenzo Verde 25
3 Classification of Attacks on Cryptographic Protocols Luca Spalazzi Simone Tacconi 47
4 Wi-Fi Security Sufian Yousef 83
5 Auditing, Penetration Testing and Ethical Hacking Frank Leonhardt 93
6 VoIP Security Issues Frank Leonhardt 103
7 Secure by Design: Considering Security from the Early Stages of the Information Systems Development Haralambos Mouratidis 115
8 Online Transactions' Security James Kadirire 133
9 Security and E-Accessibility of Online Banking Hamid Jahankhani Liaqat Ali Hossein Jahankhani 155
10 Towards an Integrated Network Security Framework Using the Y-Comm Architecture Glenford Mapp Jon Crowcroft Raphael Phan 169
11 Introduction to Behavioural Biometrics Kenneth Revett 185
12 Information Security Management and Standards of Best Practice Theo Tryfonas 207
13 Security Risk Management Strategy Hamid Jahankhani Mathews Z. Nkhoma Haralambos Mouratidis 237
14 Open Source Intelligence David Lilburn Watson 263
15 Digital Identity Management Elias Pimenidis 279
16 E-Security and Critical National Infrastructures Howard Thompson 295
17 Digital Forensics Techniques and Tools Roberto Di Pietro Nino Vincenzo Verde 321
18 iPod, Cell and Smart Phone Forensics M. Mattiucci R. Olivieri L. Giampieri S. Monfreda G. Finizia 357
19 A Methodology for Smartphones Internal Memory Acquisition, Decoding and Analysis Rosamaria Bertè Fabio Dellutri Antonio Grillo Alessandro Lentini Gianluigi Me Vittorio Ottaviani 383
20 Analysis of E-Mail Headers Alessandro Obino Massimo Bernaschi 395
21 Digital Evidence Manipulation Using Anti-Forensic Tools and Techniques Hamid Jahankhani Elidon Beqiri 411
22 Hidden Data and Steganography David Lilburn Watson 427
23 Cyberspace and Cybercrime Vagelis Papakonstantinou 455
24 Intellectual Property Rights: The Security Perspective Vagelis Papakonstantinou 477
25 Legal Issues on the Protection of Personal Data on the Internet Evi Chatziliassi 497
26 Downloading Music: Legal Facts Hamid Jahankhani Chris O. Folorunso 513
27 The Use of Electronic Surveillance in Conducting Criminal Investigations on the Internet Murdoch Watney 525
28 The Legal Conflict Between Security and Privacy in Addressing Terrorism and Other Crime on the Internet Murdoch Watney 553
29 Cybercrime Hamid Jahankhani Ameer Al-Nemrat 573
30 Cybercrime: Innocent Victims and Their Plight for Justice Hamid Jahankhani Kevin Orme 585
31 Intelligent Decision Support Systems for Assistance in Forensic Investigation Processes Dale Dzemydiene 603
32 Bioinformatics and Biometrics Kenneth Revett 631
33 Criminal Data Mining Viktoras Justickis 657
Index 693