Handbook Of Electronic Security And Digital Forensics
- 708 pages
- English
- PDF
- Available on iOS & Android
Handbook Of Electronic Security And Digital Forensics
About This Book
The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals.This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.
Frequently asked questions
Information
Table of contents
- CONTENTS
- Foreword
- 1 OS and Network Security Roberto Di Pietro and Nino Vincenzo Verde
- 2 Authentication Roberto Di Pietro and Nino Vincenzo Verde
- 3 Classification of Attacks on Cryptographic Protocols Luca Spalazzi and Simone Tacconi
- 4 Wi-FiSecurity Sufian Yousef
- 5 Auditing, Penetration Testing and Ethical Hacking Frank Leonhardt
- 6 VoIP Security Issues Frank Leonhardt
- 7 Secure by Design: Considering Security from the Early Stages of the Information Systems Development Haralambos Mouratidis
- 8 Online Transactionsâ Security James Kadirire
- 9 Security and E-Accessibility of Online Banking Hamid Jahankhani, Liaqat Ali and Hossein Jahankhani
- 10 Towards an Integrated Network Security Framework Using the Y-Comm Architecture Glenford Mapp, Jon Crowcroft and Raphael Phan
- 11 Introduction to Behavioural Biometrics Kenneth Revett
- 12 Information Security Management and Standards of Best Practice Theo Tryfonas
- 13 Security Risk Management Strategy Hamid Jahankhani, Mathews Z. Nkhoma and Haralambos Mouratidis
- 14 Open Source Intelligence David Lilburn Watson
- 15 Digital Identity Management Elias Pimenidis
- 16 E-Security and Critical National Infrastructures Howard Thompson
- 17 Digital Forensics Techniques and Tools Roberto Di Pietro and Nino Vincenzo Verde
- 18 iPod, Cell and Smart Phone Forensics M. Mattiucci, R. Olivieri, L. Giampieri, S. Monfreda and G. Finizia
- 19 A Methodology for Smartphones Internal Memory Acquisition, Decoding and Analysis Rosamaria Bert`e, Fabio Dellutri, Antonio Grillo, Alessandro Lentini, Gianluigi Me and Vittorio Ottaviani
- 20 Analysis of E-Mail Headers Alessandro Obino and Massimo Bernaschi
- 21 Digital Evidence Manipulation Using Anti-Forensic Tools and Techniques Hamid Jahankhani and Elidon Beqiri
- 22 Hidden Data and Steganography David Lilburn Watson
- 23 Cyberspace and Cybercrime Vagelis Papakonstantinou
- 24 Intellectual Property Rights: The Security Perspective Vagelis Papakonstantinou
- 25 Legal Issues on the Protection of Personal Data on the Internet Evi Chatziliassi
- 26 Downloading Music: Legal Facts Hamid Jahankhani and Chris O. Folorunso
- 27 The Use of Electronic Surveillance in Conducting Criminal Investigations on the Internet Murdoch Watney
- 28 The Legal Conflict Between Security and Privacy in Addressing Terrorism and Other Crime on the Internet Murdoch Watney
- 29 Cybercrime Hamid Jahankhani and Ameer Al-Nemrat
- 30 Cybercrime: Innocent Victims and Their Plight for Justice Hamid Jahankhani and Kevin Orme
- 31 Intelligent Decision Support Systems for Assistance in Forensic Investigation Processes Dale Dzemydiene
- 32 Bioinformatics and Biometrics Kenneth Revett
- 33 Criminal Data Mining Viktoras Justickis
- Index