Handbook of Electronic Security and Digital Forensics

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $203.37
Usually ships in 1-2 business days
(Save 19%)
Other sellers (Hardcover)
  • All (6) from $203.37   
  • New (5) from $203.37   
  • Used (1) from $228.98   

More About This Textbook

Overview

The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals.

This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.

Read More Show Less

Product Details

  • ISBN-13: 9789812837035
  • Publisher: World Scientific Publishing Company, Incorporated
  • Publication date: 5/28/2010
  • Pages: 708
  • Product dimensions: 6.70 (w) x 9.80 (h) x 1.40 (d)

Table of Contents

Foreword v

1 OS and Network Security Roberto Di Pietro Nino Vincenzo Verde 1

2 Authentication Roberto Di Pietro Nino Vincenzo Verde 25

3 Classification of Attacks on Cryptographic Protocols Luca Spalazzi Simone Tacconi 47

4 Wi-Fi Security Sufian Yousef 83

5 Auditing, Penetration Testing and Ethical Hacking Frank Leonhardt 93

6 VoIP Security Issues Frank Leonhardt 103

7 Secure by Design: Considering Security from the Early Stages of the Information Systems Development Haralambos Mouratidis 115

8 Online Transactions' Security James Kadirire 133

9 Security and E-Accessibility of Online Banking Hamid Jahankhani Liaqat Ali Hossein Jahankhani 155

10 Towards an Integrated Network Security Framework Using the Y-Comm Architecture Glenford Mapp Jon Crowcroft Raphael Phan 169

11 Introduction to Behavioural Biometrics Kenneth Revett 185

12 Information Security Management and Standards of Best Practice Theo Tryfonas 207

13 Security Risk Management Strategy Hamid Jahankhani Mathews Z. Nkhoma Haralambos Mouratidis 237

14 Open Source Intelligence David Lilburn Watson 263

15 Digital Identity Management Elias Pimenidis 279

16 E-Security and Critical National Infrastructures Howard Thompson 295

17 Digital Forensics Techniques and Tools Roberto Di Pietro Nino Vincenzo Verde 321

18 iPod, Cell and Smart Phone Forensics M. Mattiucci R. Olivieri L. Giampieri S. Monfreda G. Finizia 357

19 A Methodology for Smartphones Internal Memory Acquisition, Decoding and Analysis Rosamaria Bertè Fabio Dellutri Antonio Grillo Alessandro Lentini Gianluigi Me Vittorio Ottaviani 383

20 Analysis of E-Mail Headers Alessandro Obino Massimo Bernaschi 395

21 Digital Evidence Manipulation Using Anti-Forensic Tools and Techniques Hamid Jahankhani Elidon Beqiri 411

22 Hidden Data and Steganography David Lilburn Watson 427

23 Cyberspace and Cybercrime Vagelis Papakonstantinou 455

24 Intellectual Property Rights: The Security Perspective Vagelis Papakonstantinou 477

25 Legal Issues on the Protection of Personal Data on the Internet Evi Chatziliassi 497

26 Downloading Music: Legal Facts Hamid Jahankhani Chris O. Folorunso 513

27 The Use of Electronic Surveillance in Conducting Criminal Investigations on the Internet Murdoch Watney 525

28 The Legal Conflict Between Security and Privacy in Addressing Terrorism and Other Crime on the Internet Murdoch Watney 553

29 Cybercrime Hamid Jahankhani Ameer Al-Nemrat 573

30 Cybercrime: Innocent Victims and Their Plight for Justice Hamid Jahankhani Kevin Orme 585

31 Intelligent Decision Support Systems for Assistance in Forensic Investigation Processes Dale Dzemydiene 603

32 Bioinformatics and Biometrics Kenneth Revett 631

33 Criminal Data Mining Viktoras Justickis 657

Index 693

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)