Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Forensic investigations and risk man...
~
Shrivastava, Gulshan, (1987-)
Forensic investigations and risk management in mobile and wireless communications
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Forensic investigations and risk management in mobile and wireless communications/ Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors.
other author:
Agarwal, Basant.
Published:
Hershey, Pennsylvania :IGI Global, : 2020.,
Description:
1 online resource (xxii, 314 p.)
Subject:
Computer crimes - Investigation. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0
ISBN:
9781522595564 (ebk.)
Forensic investigations and risk management in mobile and wireless communications
Forensic investigations and risk management in mobile and wireless communications
[electronic resource] /Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors. - Hershey, Pennsylvania :IGI Global,2020. - 1 online resource (xxii, 314 p.)
Includes bibliographical references and index.
Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks.
"This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"--
ISBN: 9781522595564 (ebk.)Subjects--Topical Terms:
563858
Computer crimes
--Investigation.
LC Class. No.: TK5103.4837 / .F67 2020e
Dewey Class. No.: 363.25/2
Forensic investigations and risk management in mobile and wireless communications
LDR
:02199nam a2200265 a 4500
001
1041235
003
IGIG
005
20211015164054.0
006
m o d
007
cr cn
008
211215s2019 pau fob 001 0 eng d
020
$a
9781522595564 (ebk.)
020
$a
9781522595540 (hbk.)
020
$a
9781522595557 (pbk.)
035
$a
(OCoLC)1111726034
035
$a
1101012105
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5103.4837
$b
.F67 2020e
082
0 0
$a
363.25/2
$2
23
245
0 0
$a
Forensic investigations and risk management in mobile and wireless communications
$h
[electronic resource] /
$c
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, and Basant Agarwal, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2020.
300
$a
1 online resource (xxii, 314 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Forensic investigation and issues in the mobile and wireless device. Chapter 1. Security, privacy, forensics analysis for smartphones ; Chapter 2. Smartphone security and forensic analysis ; Chapter 3. Dynamical forensic inference for malware in IoT-based wireless transmissions ; Chapter 4. Biometrics for forensic identification in web applications and social platforms using deep learning ; Chapter 5. Denial-of-service and botnet analysis, detection, and mitigation -- Section 2. Security and privacy issues in mobile and wireless communication. Chapter 6. Redundancy management and host intrusion detection in WSN ; Chapter 7. Substantiation of vulnerabilities in various secure routing protocols of MANET ; Chapter 8. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 9. Cognitive radio network-based design and security challenges in 5g communication ; Chapter 10. Demistifying ethereum technology: application and benefits of decentralization ; Chapter 11. Help me invest: investment tools and security risks.
520
3
$a
"This book examines mobile forensics and analytics, network security, computer science, security engineering, and forensic computing"--
$c
Provided by publisher.
650
0
$a
Computer crimes
$x
Investigation.
$3
563858
650
0
$a
Digital forensic science.
$3
1205905
650
0
$a
Mobile device forensics.
$3
1060518
700
1
$a
Agarwal, Basant.
$3
1103701
700
1
$a
Shrivastava, Gulshan,
$d
1987-
$3
1312000
700
1
$a
Makino, Mitsunori.
$3
1340566
700
1
$a
Sharma, Kavita,
$d
1985-
$3
1340565
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9554-0
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login