Advanced methodologies and technolog...
Khosrow-Pour, Mehdi, (1951-)

Linked to FindBook      Google Book      Amazon      博客來     
  • Advanced methodologies and technologies in system security, information privacy, and forensics
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Advanced methodologies and technologies in system security, information privacy, and forensics/ Mehdi Khosrow-Pour, D.B.A., editor.
    other author: Khosrow-Pour, Mehdi,
    Published: Hershey, Pennsylvania :IGI Global, : [2019],
    Description: 1 online resource (xv, 417 p.)
    [NT 15003449]: Section 1. Criminal science and forensics. Chapter 1. Forensic investigations in cloud computing ; Chapter 2. Internet-facilitated child sexual exploitation crimes ; Chapter 3. Knowledge-based forensic patterns and engineering system ; Chapter 4. Uncovering limitations of E01 self-verifying files -- Section 2. Cyber crime, cyber bullying, and digital terrorism. Chapter 5. Cyber security protection for online gaming applications ; Chapter 6. Piracy and intellectual property theft in the internet era ; Chapter 7. Secure group key sharing protocols and cloud system -- Section 3. Cyber and network security. Chapter 8. Security of internet-, intranet-, and computer-based examinations in terms of technical, authentication, and environmental, where are we? ; Chapter 9. A three-vector approach to blind spots in cybersecurity ; Chapter 10. Cyber bullying ; Chapter 11. Cyberbullying among Malaysian children based on research evidence ; Chapter 12. The nature, extent, causes, and consequences of cyberbullying -- Section 4. IT security and ethics. Chapter 13. Computer fraud challenges and its legal implications ; Chapter 14. Cost estimation and security investment of security projects ; Chapter 15. Development of personal information privacy concerns evaluation ; Chapter 16. Digital video watermarking using diverse watermarking schemes ; Chapter 17. Ethical computing continues from problem to solution ; Chapter 18. Group signature system using multivariate asymmetric cryptography ; Chapter 19. Hexa-dimension Code of practice for data privacy protection ; Chapter 20. Information and communication technology ethics and social responsibility ; Chapter 21. Intrusion tolerance techniques ; Chapter 22. New perspectives of pattern recognition for automatic credit card fraud detection ; Chapter 23. Privacy, algorithmic discrimination, and the Internet of things ; Chapter 24. The protection policy for youth online in Japan ; Chapter 25. Security of identity-based encryption algorithms ; Chapter 26. Steganography using biometrics ; Chapter 27. Usable security.
    Subject: Computer security. -
    Online resource: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7
    ISBN: 9781522574934 (e-book)
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9371562 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A353 2019e 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login