語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced methodologies and technolog...
~
Khosrow-Pour, Mehdi, (1951-)
FindBook
Google Book
Amazon
博客來
Advanced methodologies and technologies in system security, information privacy, and forensics
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advanced methodologies and technologies in system security, information privacy, and forensics/ Mehdi Khosrow-Pour, D.B.A., editor.
其他作者:
Khosrow-Pour, Mehdi,
出版者:
Hershey, Pennsylvania :IGI Global, : [2019],
面頁冊數:
1 online resource (xv, 417 p.)
內容註:
Section 1. Criminal science and forensics. Chapter 1. Forensic investigations in cloud computing ; Chapter 2. Internet-facilitated child sexual exploitation crimes ; Chapter 3. Knowledge-based forensic patterns and engineering system ; Chapter 4. Uncovering limitations of E01 self-verifying files -- Section 2. Cyber crime, cyber bullying, and digital terrorism. Chapter 5. Cyber security protection for online gaming applications ; Chapter 6. Piracy and intellectual property theft in the internet era ; Chapter 7. Secure group key sharing protocols and cloud system -- Section 3. Cyber and network security. Chapter 8. Security of internet-, intranet-, and computer-based examinations in terms of technical, authentication, and environmental, where are we? ; Chapter 9. A three-vector approach to blind spots in cybersecurity ; Chapter 10. Cyber bullying ; Chapter 11. Cyberbullying among Malaysian children based on research evidence ; Chapter 12. The nature, extent, causes, and consequences of cyberbullying -- Section 4. IT security and ethics. Chapter 13. Computer fraud challenges and its legal implications ; Chapter 14. Cost estimation and security investment of security projects ; Chapter 15. Development of personal information privacy concerns evaluation ; Chapter 16. Digital video watermarking using diverse watermarking schemes ; Chapter 17. Ethical computing continues from problem to solution ; Chapter 18. Group signature system using multivariate asymmetric cryptography ; Chapter 19. Hexa-dimension Code of practice for data privacy protection ; Chapter 20. Information and communication technology ethics and social responsibility ; Chapter 21. Intrusion tolerance techniques ; Chapter 22. New perspectives of pattern recognition for automatic credit card fraud detection ; Chapter 23. Privacy, algorithmic discrimination, and the Internet of things ; Chapter 24. The protection policy for youth online in Japan ; Chapter 25. Security of identity-based encryption algorithms ; Chapter 26. Steganography using biometrics ; Chapter 27. Usable security.
標題:
Computer security. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7
ISBN:
9781522574934 (e-book)
Advanced methodologies and technologies in system security, information privacy, and forensics
Advanced methodologies and technologies in system security, information privacy, and forensics
[electronic resource] /Mehdi Khosrow-Pour, D.B.A., editor. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (xv, 417 p.)
Includes bibliographical references and index.
Section 1. Criminal science and forensics. Chapter 1. Forensic investigations in cloud computing ; Chapter 2. Internet-facilitated child sexual exploitation crimes ; Chapter 3. Knowledge-based forensic patterns and engineering system ; Chapter 4. Uncovering limitations of E01 self-verifying files -- Section 2. Cyber crime, cyber bullying, and digital terrorism. Chapter 5. Cyber security protection for online gaming applications ; Chapter 6. Piracy and intellectual property theft in the internet era ; Chapter 7. Secure group key sharing protocols and cloud system -- Section 3. Cyber and network security. Chapter 8. Security of internet-, intranet-, and computer-based examinations in terms of technical, authentication, and environmental, where are we? ; Chapter 9. A three-vector approach to blind spots in cybersecurity ; Chapter 10. Cyber bullying ; Chapter 11. Cyberbullying among Malaysian children based on research evidence ; Chapter 12. The nature, extent, causes, and consequences of cyberbullying -- Section 4. IT security and ethics. Chapter 13. Computer fraud challenges and its legal implications ; Chapter 14. Cost estimation and security investment of security projects ; Chapter 15. Development of personal information privacy concerns evaluation ; Chapter 16. Digital video watermarking using diverse watermarking schemes ; Chapter 17. Ethical computing continues from problem to solution ; Chapter 18. Group signature system using multivariate asymmetric cryptography ; Chapter 19. Hexa-dimension Code of practice for data privacy protection ; Chapter 20. Information and communication technology ethics and social responsibility ; Chapter 21. Intrusion tolerance techniques ; Chapter 22. New perspectives of pattern recognition for automatic credit card fraud detection ; Chapter 23. Privacy, algorithmic discrimination, and the Internet of things ; Chapter 24. The protection policy for youth online in Japan ; Chapter 25. Security of identity-based encryption algorithms ; Chapter 26. Steganography using biometrics ; Chapter 27. Usable security.
Restricted to subscribers or individual electronic text purchasers.
"This book presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combating digital risks and cyber threats"--Provided by publisher.
ISBN: 9781522574934 (e-book)Subjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / A353 2019e
Dewey Class. No.: 005.8
Advanced methodologies and technologies in system security, information privacy, and forensics
LDR
:03405nmm 2200277 a 4500
001
2184033
003
IGIG
005
20191025150713.0
006
m o d
007
cr cn
008
191225s2019 pau fob 001 0 eng d
010
$z
2018029248
020
$a
9781522574934 (e-book)
020
$a
9781522574927 (hardback)
035
$a
(OCoLC)1051151104
035
$a
1081021277
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
A353 2019e
082
0 0
$a
005.8
$2
23
245
0 0
$a
Advanced methodologies and technologies in system security, information privacy, and forensics
$h
[electronic resource] /
$c
Mehdi Khosrow-Pour, D.B.A., editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (xv, 417 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Criminal science and forensics. Chapter 1. Forensic investigations in cloud computing ; Chapter 2. Internet-facilitated child sexual exploitation crimes ; Chapter 3. Knowledge-based forensic patterns and engineering system ; Chapter 4. Uncovering limitations of E01 self-verifying files -- Section 2. Cyber crime, cyber bullying, and digital terrorism. Chapter 5. Cyber security protection for online gaming applications ; Chapter 6. Piracy and intellectual property theft in the internet era ; Chapter 7. Secure group key sharing protocols and cloud system -- Section 3. Cyber and network security. Chapter 8. Security of internet-, intranet-, and computer-based examinations in terms of technical, authentication, and environmental, where are we? ; Chapter 9. A three-vector approach to blind spots in cybersecurity ; Chapter 10. Cyber bullying ; Chapter 11. Cyberbullying among Malaysian children based on research evidence ; Chapter 12. The nature, extent, causes, and consequences of cyberbullying -- Section 4. IT security and ethics. Chapter 13. Computer fraud challenges and its legal implications ; Chapter 14. Cost estimation and security investment of security projects ; Chapter 15. Development of personal information privacy concerns evaluation ; Chapter 16. Digital video watermarking using diverse watermarking schemes ; Chapter 17. Ethical computing continues from problem to solution ; Chapter 18. Group signature system using multivariate asymmetric cryptography ; Chapter 19. Hexa-dimension Code of practice for data privacy protection ; Chapter 20. Information and communication technology ethics and social responsibility ; Chapter 21. Intrusion tolerance techniques ; Chapter 22. New perspectives of pattern recognition for automatic credit card fraud detection ; Chapter 23. Privacy, algorithmic discrimination, and the Internet of things ; Chapter 24. The protection policy for youth online in Japan ; Chapter 25. Security of identity-based encryption algorithms ; Chapter 26. Steganography using biometrics ; Chapter 27. Usable security.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combating digital risks and cyber threats"--Provided by publisher.
650
0
$a
Computer security.
$3
540555
650
0
$a
Data protection.
$3
590548
650
0
$a
Digital forensic science.
$3
3338165
650
0
$a
Computer networks
$x
Security measures.
$3
579161
700
1
$a
Khosrow-Pour, Mehdi,
$d
1951-
$e
editor.
$3
3310649
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9371562
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A353 2019e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入