Combating security breaches and criminal activity in the digital sphere:
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044261138 | ||
003 | DE-604 | ||
005 | 20190913 | ||
007 | cr|uuu---uuuuu | ||
008 | 170405s2016 xx o|||| 00||| eng d | ||
020 | |a 9781522501947 |9 978-1-5225-0194-7 | ||
024 | 7 | |a 10.4018/978-1-5225-0193-0 |2 doi | |
035 | |a (OCoLC)986504159 | ||
035 | |a (DE-599)BVBBV044261138 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1049 |a DE-706 |a DE-91 |a DE-573 |a DE-1050 |a DE-20 |a DE-898 |a DE-83 | ||
245 | 1 | 0 | |a Combating security breaches and criminal activity in the digital sphere |c S. Geetha (VIT University, Chennai, India), Asnath Victy Phamila (VIT University, Chennai, India) |
264 | 1 | |a Hershey PA, USA |b Information Science Reference, an imprint of IGI Global |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource (xx, 309 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series | |
490 | 0 | |a Premier reference source | |
700 | 1 | |a Geetha, S. |4 edt | |
700 | 1 | |a Phamila, Asnath Victy |d 1978- |0 (DE-588)1129269787 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-5225-0193-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-0193-2 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029666066&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-98-IGB | ||
912 | |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029666066 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2328799 |
---|---|
_version_ | 1821934061530120192 |
adam_text | TABLE OF CONTENTS
PREFACE XVI
SECTION 1
DIGITAL SPHERE THREATS AND VULNERABILITIES
CHAPTER 1
A REVIEW ON DIGITAL SPHERE THREATS AND VULNERABILITIES 1
MUTHURAMALINGAM S., THIAGARAJAR COLLEGE OF ENGINEERING, INDIA
THANGAVEL M., THIAGARAJAR COLLEGE OF ENGINEERING, INDIA
SRIDHAR S., THIAGARAJAR COLLEGE OF ENGINEERING, INDIA
CHAPTER 2
ADVANCES IN BIOMETRICS FOR SECURE HUMAN AUTHENTICATION SYSTEM: BIOMETRIC
AUTHENTICATION
SYSTEM 22
JAGANNATH MOHAN, VIT UNIVERSITY, INDIA
ADALARASU KANAGASABAI, PSNA COLLEGE OF ENGINEERING AND TECHNOLOGY, INDIA
VETRIVELAN PANDU, VIT UNIVERSITY, INDIA
CHAPTER 3
AGAINST SPOOFING ATTACKS IN NETWORK LAYER 41
KAVISANKAR L, SRM UNIVERSITY, INDIA
CHELLAPPAN C, GKM COLLEGE OF ENGINEERING AND TECHNOLOGY, INDIA
POOVAMMAL E., SRM UNIVERSITY, INDIA
CHAPTER 4
CLASSIFICATION OF CYBERCRIMES AND PUNISHMENTS UNDER THE INFORMATION
TECHNOLOGY ACT, 2000 57
SREE KRISHNA BHARADWAJ H., NATIONAL LAW SCHOOL OF INDIA UNIVERSITY,
INDIA
SECTION 2
TECHNIQUES FOR COMBATING SECURITY BREACHES
CHAPTER 5
CLOUD CRIME AND FRAUD: A STUDY OF CHALLENGES FOR CLOUD SECURITY AND
FORENSICS 68
NIMISHA SINGH, BIRLA INSTITUTE OF MANAGEMENT TECHNOLOGY, INDIA
CHAPTER 6
COMBATING CYBER SECURITY BREACHES IN DIGITAL WORLD USING MISUSE
DETECTION METHODS: MISUSE
DETECTION 85
SUBBULAKSHMI T, VIT UNIVERSITY, INDIA
CHAPTER 7
CRITICAL VIDEO SURVEILLANCE AND IDENTIFICATION OF HUMAN BEHAVIOR
ANALYSIS OF ATM SECURITY
SYSTEMS 93
M. SIVABALAKRISHNAN, VIT UNIVERSITY, INDIA
R. MENAKA, VIT UNIVERSITY, INDIA
S. JEEVA, VIT UNIVERSITY, INDIA
CHAPTER 8
DIGITAL EVIDENCE IN PRACTICE: PROCEDURE AND TOOLS 119
UMA N. DULHARE, MJCET, INDIA
SHAIK RASOOL, MJCET, INDIA
SECTION 3
CYBER FORENSICS AND INVESTIGATION
CHAPTER 9
DIGITAL FORENSIC AND MACHINE LEARNING 141
POONKODI MARIAPPAN, SRM UNIVERSITY, INDIA
PADHMAVATHI B., SRM UNIVERSITY, INDIA
TALLURI SRINIVASA TEJA, SRM UNIVERSITY, INDIA
CHAPTER 10
EFFECTIVE RECOGNITION OF STEREO IMAGE CONCEALED MEDIA OF INTERPOLATION
ERROR WITH DIFFERENCE
EXPANSION 157
HEMALATHA J., THIAGARAJAR COLLEGE OF ENGINEERING, INDIA
KAVITHA DEVI M. K., THIAGARAJAR COLLEGE OF ENGINEERING INDIA
CHAPTER 11
MOBILE MALWARE 166
GEOGEN G., SRM UNIVERSITY, INDIA
POOVAMMAL E., SRM UNIVERSITY, INDIA
CHAPTER 12
NETWORK INTRUSION DETECTION AND PREVENTION SYSTEMS ON FLOODING AND WORM
ATTACKS 183
P. VETRIVELAN, VIT UNIVERSITY, INDIA
M. JAGANNATH, VIT UNIVERSITY, INDIA
T. S. PRADEEP KUMAR, VIT UNIVERSITY, INDIA
SECTION 4
VISUAL INFORMATION SECURITY
CHAPTER 13
A SYSTEMATIC MAPPING OF SECURITY MECHANISMS 209
GAYATHRI RAJAKUMARAN, VIT UNIVERSITY, INDIA
NEELANARAYANAN VENKATARAMAN, VIT UNIVERSITY, INDIA
CHAPTER 14
UNDERSTANDING ANTI-FORENSICS TECHNIQUES FOR COMBATING DIGITAL SECURITY
BREACHES AND CRIMINAL
ACTIVITY 233
RICARDO MARQUES, PONTIFICIA UNIVERSIDADE CATOLICA DE CAMPINAS, BRAZIL
ALEXANDRE MOTA, PONTIFICIA UNIVERSIDADE CATOLICA DE CAMPINAS, BRAZIL
LIA MOTA, PONTIFICIA UNIVERSIDADE CATOLICA DE CAMPINAS, BRAZIL
CHAPTER 15
VISUAL CRYPTOGRAPHY FOR SECURING IMAGES IN CLOUD 242
PUNITHAVATHI P, VIT UNIVERSITY, CHENNAI CAMPUS, INDIA
GEETHA SUBBIAH, VIT UNIVERSITY- CHENNAI CAMPUS, INDIA
CHAPTER 16
VISUAL SENSOR NETWORKS: CRITICAL INFRASTRUCTURE PROTECTION 263
SUSEELA G, VIT UNIVERSITY, INDIA
ASNATH VICTY PHAMILA Y, VIT UNIVERSITY, INDIA
COMPILATION OF REFERENCES 283
ABOUT THE CONTRIBUTORS 302
INDEX 307
DETAILED TABLE OF CONTENTS
PREFACE XVI
SECTION 1
DIGITAL SPHERE THREATS AND VULNERABILITIES
CHAPTER 1
A REVIEW ON DIGITAL SPHERE THREATS AND VULNERABILITIES 1
MUTHURAMALINGAM S., THIAGAMJAR COLLEGE OF ENGINEERING, INDIA
THANGAVELM., THIAGARAJAR COLLEGE OF ENGINEERING, INDIA
SRIDHAR S., THIAGARAJAR COLLEGE OF ENGINEERING, INDIA
DIGITAL SPHERE IS A GLOBAL NETWORK WHICH CONSISTS OF ALL THE RESOURCES
THAT ARE REQUIRED FOR THE USERS,
WHO CONNECTED WITH THE DIGITAL NETWORK. IT CONNECTS THE ENTIRE WORLD
THROUGH THE DIGITAL TECHNOLOGIES.
THE DIGITAL NETWORK INCLUDES SERVICES, APPLICATIONS, AND WEB PAGE FILES.
BY CONNECTING, TO THIS NETWORK,
PEOPLE FROM ONE END IN THE WORLD CAN ABLE TO COMMUNICATE AND SHARE THEIR
KNOWLEDGE ACROSS THE WORLD.
GLOBAL COMMUNICATION AND SHARING MAY ALLOW AN UNKNOWN PERSON WHICH CAN
DISRUPT THE SERVICES. THIS
CHAPTER PROPOSES A REVIEW ON THE THREATS AND VULNERABILITIES RELATED TO
THE DIGITAL SPHERE NETWORK WITH
VALUE ADDED SECURITY GUIDELINES AND COUNTERMEASURES GIVEN TO OVERCOME
SUCH ISSUES.
CHAPTER 2
ADVANCES IN BIOMETRICS FOR SECURE HUMAN AUTHENTICATION SYSTEM: BIOMETRIC
AUTHENTICATION
SYSTEM 22
JAGANNATH MOHAN, VIT UNIVERSITY, INDIA
ADALARASU KANAGASABAI, PSNA COLLEGE OF ENGINEERING AND TECHNOLOGY, INDIA
VETRIVELAN PANDU, VIT UNIVERSITY, INDIA
IN THE RECENT DECADE, ONE OF OUR MAJ OR CONCERNS IN THE GLOBAL
TECHNOLOGICAL SOCIETY OF INFORMATION SECURITY
IS CONFIRMATION THAT A PERSON ACCESSING CONFIDENTIAL INFORMATION IS
AUTHORIZED TO PERFORM SO. SUCH MODE
OF ACCESS IS GENERALLY ACCOMPLISHED BY A PERSON S CONFIRMING THEIR
IDENTITY BY THE USE OF SOME METHOD OF
AUTHENTICATION SYSTEM. IN PRESENT DAYS, THE REQUIREMENT FOR SAFE
SECURITY IN STORING INDIVIDUAL INFORMATION
HAS BEEN DEVELOPING RAPIDLY AND AMONG THE POTENTIAL ALTERNATIVE IS
IMPLEMENTING INNOVATIVE BIOMETRIC
IDENTIFICATION TECHNIQUES. THIS CHAPTER DISCUSSES HOW THE ADVENT OF THE
20TH CENTURY HAS BROUGHT FORTH
THE SECURITY PRINCIPLES OF IDENTIFICATION AND AUTHENTICATION IN THE
FIELD OF BIOMETRIC ANALYSIS. THE CHAPTER
REVIEWS VULNERABILITIES IN BIOMETRIC AUTHENTICATION AND ISSUES IN SYSTEM
IMPLEMENTATION. THE CHAPTER ALSO
PROPOSES THE MULTIFACTOR AUTHENTICATION AND THE USE OF MULTIMODAL
BIOMETRICS, I.E., THE COMBINATION OF
ELECTROCARDIOGRAM (ECG) AND PHONOCARDIOGRAM (PCG) SIGNALS TO ENHANCE
RELIABILITY IN THE AUTHENTICATION
PROCESS.
CHAPTER 3
AGAINST SPOORING ATTACKS IN NETWORK LAYER 41
KAVISANKAR L., SRM UNIVERSITY, INDIA
CHELLAPPAN C, GKM COLLEGE OF ENGINEERING AND TECHNOLOGY, INDIA
POOVAMMAL E., SRM UNIVERSITY, INDIA
IN THE CONTEXT OF NETWORK SECURITY, A SPOOFING ATTACK IS A CONDITION IN
WHICH ONE PERSON OR A PROGRAM
SUCCESSFULLY MASQUERADES AS ANOTHER. THIS IS DONE BY PROVIDING
COUNTERFEIT DATA WITH THE MALICIOUS
INTENTION OF GAINING AN ILLEGITIMATE ADVANTAGE. SPOOFING ATTACK WHICH
MAY BE GENERATED IN VARIOUS LAYER
OF OPEN SYSTEMS INTERCONNECTION MODEL (OSI MODEL) IS DISCUSSED IN THIS
CHAPTER. THE CHAPTER ENDS WITH
DISCUSSING ABOUT THE POSSIBLE SPOOFING ATTACKS IN NETWORK LAYER AND THE
RELEVANT DEFENSE MECHANISM OF
THE SAME. THE DETAILED ANALYSIS AND DISCUSSION IS MADE ON THE SPOOFING
ATTACK OVER THE NETWORK LAYER
BECAUSE, DENIAL-OF-SERVICE (DOS) AND DISTRIBUTED DENIAL-OF-SERVICE
(DDOS) ATTACKS MORE DEVASTATING
WHILE USING NETWORK PROTOCOL LIKE INTERNET PROTOCOL (IP) WHICH HAVE
BECOME MORE OF A THREAT THAN EVER
FOR THE PAST FEW YEARS.
CHAPTER 4
CLASSIFICATION OF CYBERCRIMES AND PUNISHMENTS UNDER THE INFORMATION
TECHNOLOGY ACT, 2000 57
SREE KRISHNA BHARADWAJ H., NATIONAL LAW SCHOOL OF INDIA UNIVERSITY,
INDIA
CYBERCRIMES ARE THOSE CRIMES WHICH ARE ASSOCIATED WITH THE LATEST
TECHNOLOGY INCLUDING INTERNET. THERE
ARE VARIOUS FORMS OF COMMITTING CRIMES USING THE INTERNET. AS A RESULT
NEWER FORMS OF CRIMES HAVE
EMERGED IN THE SOCIETY. SOME OF THE NEWER CRIMES ARE TRADITIONAL CRIMES
WHICH ARE COMMITTED THROUGH
THE INTERNET SUCH AS DEFAMATION, FRAUD, HARASSMENT, TRESPASS ETC. IT IS
NECESSARY TO UNDERSTAND WHAT THE
LAWS IN INDIA SUGGEST TOWARDS THESE KIND OF NEWER CRIMES HAPPENING IN
THE SOCIETY. THIS PAPER DEALS
WITH THE TYPES OF CYBERCRIMES AND ALSO PROVIDES THE OFFENCES AND
PUNISHMENTS UNDER THE INFORMATION
TECHNOLOGY ACT, 2000 IN INDIA.
SECTION 2
TECHNIQUES FOR COMBATING SECURITY BREACHES
CHAPTER 5
CLOUD CRIME AND FRAUD: A STUDY OF CHALLENGES FOR CLOUD SECURITY AND
FORENSICS 68
NIMISHA SINGH, BIRLA INSTITUTE OF MANAGEMENT TECHNOLOGY, INDIA
CHANGING TRENDS IN IT INDUSTRY ARE OPENING NEW AVENUES. WITH THE
SCALABILITY, FLEXIBILITY, AND ECONOMIC
ADVANTAGE OFFERED BY CLOUD COMPUTING, MORE AND MORE ORGANIZATIONS ARE
MOVING TOWARDS CLOUD FOR THEIR
APPLICATIONS. WITH ALL THE BENEFITS OF CLOUD COMPUTING, IT POSES A
DANGER OF DIGITAL CRIME AND SECURITY
BREACHES. THESE CHALLENGES ARE COMPOUNDED BY THE FACT THAT CYBERCRIME
AND THE TRANSGRESSORS TRANSCEND
GEOGRAPHICAL BOUNDARIES WHILE THE LAW ENFORCEMENT DOES NOT. THIS PAPER
TRIES TO FOCUS ON HOW CLOUD
COMPUTING IS RISING TO THE CHALLENGES THROWN IN FROM CYBER SPACE AND
RECENT DEVELOPMENTS TO AVOID AND
MITIGATE CLOUD FRAUD AND ABUSE. TAKING COUNTER MEASURES AT
ORGANIZATIONAL LEVEL, WILL ALLEVIATE AND UP
TO AN EXTENT ELIMINATE SECURITY BREACHES. WITH CURRENT KNOWLEDGE ON
POLICY AND STANDARDS ADOPTED BY
DEVELOPED NATIONS, THE POLICY MAKERS AND LAW ENFORCEMENT AGENCIES IN
DEVELOPING COUNTRIES CAN WORK
TOWARDS FORMULATING STANDARDS AND GUIDELINES FOR AWARENESS ON THREATS,
VULNERABILITIES AND EFFECTIVENESS
OF SECURITY CONTROLS TO RESPOND TO RISK.
CHAPTER 6
COMBATING CYBER SECURITY BREACHES IN DIGITAL WORLD USING MISUSE
DETECTION METHODS: MISUSE
DETECTION 85
SUBBULAKSHMI T, VIT UNIVERSITY, INDIA
INTRUSION DETECTION SYSTEMS (IDS) PLAY A MAJOR ROLE IN THE AREA OF
COMBATING SECURITY BREACHES FOR
INFORMATION SECURITY. CURRENT IDS ARE DEVELOPED WITH MACHINE LEARNING
TECHNIQUES LIKE ARTIFICIAL
NEURAL NETWORKS, C 4.5, KNN, NAIVE BAYES CLASSIFIERS, GENETIC ALGORITHMS
FUZZY LOGIC AND SVMS. THE
OBJECTIVE OF THIS PAPER IS TO APPLY ARTIFICIAL NEURAL NETWORKS AND
SUPPORT VECTOR MACHINES FOR INTRUSION
DETECTION. ARTIFICIAL NEURAL NETWORKS ARE APPLIED ALONG WITH FASTER
TRAINING METHODS LIKE VARIABLE LEARNING
RATE AND SCALED CONJUGATE GRADIENT. SUPPORT VECTOR MACHINES USE VARIOUS
KERNEL FUNCTIONS TO IMPROVE
THE PERFORMANCE. FROM THE KDDCUP 99 DATASET 45,657 INSTANCES ARE TAKEN
AND USED IN OUR EXPERIMENT.
THE SPEED IS COMPARED FOR VARIOUS TRAINING FUNCTIONS. THE PERFORMANCE OF
VARIOUS KERNEL FUNCTIONS IS
ASSESSED. THE DETECTION RATE OF SUPPORT VECTOR MACHINES IS FOUND TO BE
GREATER THAN ARTIFICIAL NEURAL
NETWORKS WITH LESS NUMBER OF FALSE POSITIVES AND WITH LESS TIME OF
DETECTION.
CHAPTER 7
CRITICAL VIDEO SURVEILLANCE AND IDENTIFICATION OF HUMAN BEHAVIOR
ANALYSIS OF ATM SECURITY
SYSTEMS 93
M. SIVABALAKRISHNAN, VIT UNIVERSITY, INDIA
R. MENAKA, VIT UNIVERSITY, INDIA
S. JEEVA, VIT UNIVERSITY, INDIA
VIDEO SURVEILLANCE CAMERAS ARE PLACED IN MANY PLACES SUCH AS BANK,
HOSPITAL, TOLL GATES, AIRPORTS, ETC.
TO TAKE ADVANTAGE OF THE VIDEO IN REAL TIME, A HUMAN MUST MONITOR THE
SYSTEM CONTINUOUSLY IN ORDER TO
ALERT SECURITY OFFICERS IF THERE IS AN EMERGENCY. BESIDES, FOR EVENT
DETECTION A PERSON CAN OBSERVE FOUR
CAMERAS WITH GOOD ACCURACY AT A TIME. THEREFORE, THIS REQUIRES EXPENSIVE
HUMAN RESOURCES FOR REAL TIME
VIDEO SURVEILLANCE USING CURRENT TECHNOLOGY. THE TRAJECTORY OF ONE OR
MORE TARGETS OBTAINS FOR OBJECT
TRACKING WHILE RECORDING ABOVE SPACE AND TIME. BY TRACKING VARIOUS
OBJECTS, THE BURDEN OF DETECTION BY
HUMAN SENTINELS IS GREATLY ALLEVIATED. EFFICIENT AND RELIABLE AUTOMATIC
ALARM SYSTEM IS USEFUL FOR MANY
ATM SURVEILLANCE APPLICATIONS. ATM VIDEO MONITORING SYSTEMS PRESENT MANY
CHALLENGING RESEARCH
ISSUES IN HUMAN ABNORMAL BEHAVIORS DETECTION APPROACHES. THE FRAMEWORK
OF ATM VIDEO SURVEILLANCE
SYSTEM ENCOMPASSING VARIOUS FACTORS, SUCH AS IMAGE ACQUISITION,
BACKGROUND ESTIMATION, BACKGROUND
SUBTRACTION, SEGMENTATION, PEOPLE COUNTING AND TRACKING ARE BRIEFLY
DISCUSSED IN THIS CHAPTER.
CHAPTER 8
DIGITAL EVIDENCE IN PRACTICE: PROCEDURE AND TOOLS 119
UMA N. DULHARE, MJCET, INDIA
SHAIKRASOOL, MJCET, INDIA
ADVANCED EVIDENCE IS ANY DATA OF PROBATIVE QUALITY THAT IS EITHER PUT
AWAY OR TRANSMITTED IN A DOUBLE
FRAME. IN TODAY S UNIVERSE OF PROPELLING ADVANCES, MORE DATA IS BEING
PRODUCED, PUT AWAY AND APPROPRIATED
BY ELECTRONIC MEANS. THIS REQUIRES NUMEROUS OFFICES TO BUILD THE
UTILIZATION OF ADVANCED PROOF SOCIAL
AIFAIR AS A REGULAR OR STANDARD INSTRUMENT IN THEIR FIGHT AGAINST
VIOLATIONS. COMPUTERIZED PROOF CAN BE
HELPFUL IN AN EXTENSIVE VARIETY OF CRIMINAL EXAMINATIONS. NUMEROUS
COMPUTERIZED GADGETS PRODUCTIVELY
TRACK CLIENT ACTION; IT IS LIKEWISE CONCEIVABLE TO RECOUP ERASED
RECORDS, BOTH OF WHICH MAY INFLUENCE A
CRIMINAL EXAMINATION. DATA IS SIMILAR TO THE BACKBONE FOR ASSOCIATIONS
OF ALL SIZES, SORTS AND INDUSTRY
AREAS. IT SHOULD BE OVERSEEN AND SECURED, AND WHEN THERE IS A BREAK OR
WRONGDOING CONFERRED INCLUDING
SPILLED OR STOLEN DATA, THE CULPRITS MUST BE RECOGNIZED AND INDICTED.
EXPANDED INTERNET ENTRANCE HAS
GIVEN EXPONENTIAL ASCENT IN REFINED ASSAULTS ON INFORMATION TECHNOLOGY
FRAMEWORK. KEEPING IN MIND
THE END GOAL TO MAKE OUR IT FRAMEWORK VERSATILE AGAINST THE DANGERS,
THERE IS A REQUIREMENT FOR CYBER
SECURITY. DIGITAL CRIMINOLOGY, LIKEWISE CALLED PC LEGAL SCIENCES OR
ADVANCED LEGAL SCIENCES, IS THE
PROCEDURE OF EXTRICATING DATA AND INFORMATION FROM PCS TO SERVE AS
COMPUTERIZED PROOF - FOR COMMON
PURPOSES OR, BY AND LARGE, TO DEMONSTRATE AND LAWFULLY INDICT
CYBERCRIME. PC CRIME SCENE INVESTIGATION
HAS AS OF LATE INCREASED NOTEWORTHY POPULARITY WITH NUMEROUS NEARBY LAW
AUTHORIZATION ORGANIZATIONS.
IT IS AT PRESENT UTILIZED IN EXTORTION, ROBBERY, DRUG AUTHORIZATION AND
EACH OTHER IMPLEMENTATION ACTION.
LAW IMPLEMENTATION ORGANIZATIONS CONFRONT ANOTHER TEST IN MANAGING
DIGITAL WRONGDOINGS. CRIMINAL
ACTS ARE BEING PERPETRATED AND THE CONFIRMATION OF THESE EXERCISES IS
RECORDED IN ELECTRONIC STRUCTURE.
ALSO, WRONGDOINGS ARE BEING DEDICATED IN THE INTERNET. PROOF IN THESE
VIOLATIONS IS QUITE OFTEN RECORDED
IN COMPUTERIZED DESIGN. IT IS CRITICAL THAT PC SECURITY EXPERTS KNOW
ABOUT A PERCENTAGE OF THE NECESSITIES
OF THE LAWFUL FRAMEWORK AND COMPREHENDS THE CREATING FIELD OF PC LEGAL
SCIENCES.
SECTION 3
CYBER FORENSICS AND INVESTIGATION
CHAPTER 9
DIGITAL FORENSIC AND MACHINE LEARNING 141
POONKODI MARIAPPAN, SRM UNIVERSITY, INDIA
PADHMAVATHI B., SRM UNIVERSITY, INDIA
TALLURI SRINIVASA TEJA, SRM UNIVERSITY, INDIA
DIGITAL FORENSIC AS IT SOUNDS COERCE HUMAN MIND PRIMARILY WITH
EXPLORATION OF CRIME. HOWEVER IN THE
CONTEMPORARY WORLD, DIGITAL FORENSIC HAS EVOLVED AS AN ESSENTIAL SOURCE
OF TOOLS FROM DATA ACQUISITION
TO LEGAL ACTION. BASICALLY THREE STAGES ARE INVOLVED IN DIGITAL FORENSIC
NAMELY ACQUISITION, ANALYSIS AND
REPORTING. DIGITAL FORENSIC RESEARCH WORKSHOP (DFRW) DEFINED DIGITAL
FORENSIC AS USE OF SCIENTIFICALLY
DERIVED AND PROVEN METHOD TOWARDS THE IDENTIFICATION, COLLECTION,
ANALYSIS, INTERPRETATION, DOCUMENTATION
AND PRESENTATION OF DIGITAL EVIDENCE DERIVED FROMDIGITAL SOURCES FOR THE
PURPOSE OF FACILITATING OR FURTHERING
THE RECONSTRUCTION OF EVENT TO BE CRIMINAL . THE HARD PROBLEM IN DIGITAL
FORENSIC IS SUCH THAT THE ACQUIRED
DATA NEED TO BE CLEANED AND IS REQUIRED TO BE INTELLIGIBLE FOR READING
BY HUMAN. AS A SOLUTION TO THIS
COMPLEXITY PROBLEM A NUMBER OF TOOLS ARE PRESENT WHICH MAY BE REPEATED
UNTIL RELEVANT DATA IS OBTAINED.
CHAPTER 10
EFFECTIVE RECOGNITION OF STEREO IMAGE CONCEALED MEDIA OF INTERPOLATION
ERROR WITH DIFFERENCE
EXPANSION 157
HEMALATHA J., THIAGARAJAR COLLEGE OF ENGINEERING, INDIA
KAVITHA DEVI M. K., THIAGARAJAR COLLEGE OF ENGINEERING INDIA
IN THIS CHAPTER, A NEW DATA CONCEAL TECHNIQUE IS ANTICIPATED FOR DIGITAL
IMAGES. THE METHOD COMPUTES
THE INTERPOLATION ERROR OF THE IMAGE BY USING HISTOGRAM SHIFTING METHOD
AND DIFFERENCE EXPANSION. WITH
THE EXPECTATION OF EMBEDDING HIGH PAYLOAD AND LESS DISTORTION, THE
UNDISCLOSED DATA HAS EMBEDDED IN
THE INTERPOLATING ERROR. ADDITIONALLY FOR HIDING THE DATA, REVERSIBLE
DATA HIDING TECHNIQUE IS USED. THE
HISTOGRAM DEVIATION IS USED AS EVIDENCE FOR RESULTING THE DATA CONCEAL
IN THE STEREO IMAGES. TO OUR BEST
KNOWLEDGE, BY EXTRACTING THE STATISTICAL FEATURE FROM THE IMAGE
SUBSAMPLE WORKS AS STEGANALYSIS SCHEME.
TO ENHANCE THE REVEALING RATE PRECISION THE WELL KNOWN SUPPORT VECTOR
MACHINE ACTS AS CLASSIFIER. IN
ADDITION TO THAT THE EXPERIMENTAL RESULTS SHOW THAT THE PROPOSED
STEGANALYSIS METHOD HAS ENHANCED THE
DETECTION EXACTNESS OF THE STEGO IMAGES.
CHAPTER 11
MOBILE MALWARE 166
GEOGEN G., SRM UNIVERSITY, INDIA
POOVAMMAL E., SRM UNIVERSITY, INDIA
WHY SHOULD EVERYONE KNOW ABOUT MOBILE MALWARE? WITH THE INTRODUCTION OF
INTERNET OF THINGS (IOT)
AND CLOUD, YOU CAN T SURVIVE IN A DISCONNECTED WORLD. THUS FROM YOUR
HOME APPLIANCES TO YOUR WINDOW
CURTAINS, EVERYTHING IS CONNECTED TO INTERNET WHICH CAN BE ACCESSED
THROUGH YOUR HAND HELD MOBILE DEVICE.
UNLIKE PERSONAL COMPUTERS, THESE DEVICES GIVE HACKERS A GREATER ATTACK
LANDSCAPE. BACK IN 2004, WHEN
THE FIRST MOBILE MALWARE WAS INTRODUCED, WE NEVER THOUGHT THAT IT WOULD
GET SUCH A BIG THREAT SPACE, AS
WE SEE TODAY. SO, WE DISCUSS THE HISTORY OF MOBILE MALWARES AND ITS
CATEGORIES WITH ITS MOTIVES. WE
ALSO DISCUSS FEW SIGNS THAT INDICATE THE PRESENCE OF A MOBILE MALWARE.
TO CONCLUDE WE CATEGORIZE THE
BATTLE AGAINST MALWARE INTO TWO NAMELY PREVENTION AND RESPONSE, WHICH IS
FORENSICALLY ANALYSED USING
STATIC/DYNAMIC METHODS/TOOLS.
CHAPTER 12
NETWORK INTRUSION DETECTION AND PREVENTION SYSTEMS ON FLOODING AND WORM
ATTACKS 183
P. VETRIVELAN, VIT UNIVERSITY, INDIA
M. JAGANNATH, VIT UNIVERSITY, INDIA
T. S. PRADEEP KUMAR, VIT UNIVERSITY, INDIA
THE INTERNET HAS TRANSFORMED GREATLY THE IMPROVED WAY OF BUSINESS, THIS
VAST NETWORK AND ITS ASSOCIATED
TECHNOLOGIES HAVE OPENED THE DOORS TO AN INCREASING NUMBER OF SECURITY
THREATS WHICH ARE DANGEROUS TO
NETWORKS. THE FIRST PART OF THIS CHAPTER PRESENTS A NEW DIMENSION OF
DENIAL OF SERVICE ATTACKS CALLED TCP
SYN FLOOD ATTACK HAS BEEN WITNESSED FOR SEVERITY OF DAMAGE AND SECOND
PART ON WORMS WHICH IS THE
MAJOR THREAT TO THE INTERNET. THE TCP SYN FLOOD ATTACK BY MEANS OF
ANOMALY DETECTION AND TRACES BACK
THE REAL SOURCE OF THE ATTACK USING MODIFIED EFFICIENT PACKET MARKING
ALGORITHM (EPM). THE MECHANISM
FOR DETECTING THE SMART NATURED CAMOUFLAGING WORMS WHICH IS SENSED BY
MEANS OF A TECHNIQUE CALLED
MODIFIED CONTROLLED PACKET TRANSMISSION (MCPT) TECHNIQUE. FINALLY THE
NETWORK WHICH IS AFFECTED BY
THESE TYPES OF WORMS ARE DETECTED AND RECOVERED BY MEANS OF MODIFIED
CENTRALIZED WORM DETECTOR
(MCWD) MECHANISM. THE NETWORK INTRUSION DETECTION AND PREVENTION SYSTEMS
(NIDPS) ON FLOODING
AND WORM ATTACKS WERE ANALYZED AND PRESENTED.
SECTION 4
VISUAL INFORMATION SECURITY
CHAPTER 13
A SYSTEMATIC MAPPING OF SECURITY MECHANISMS 209
GAYATHRI RAJAKUMARAN, VIT UNIVERSITY, INDIA
NEELANARAYANAN VENKATARAMAN, VIT UNIVERSITY, INDIA
IN THE INTERNET ERA, MILLIONS OF COMPUTER SYSTEMS ARE CONNECTED TO THE
INTERNET AND THE NUMBER IS
INCREASING INFINITELY. MAINTAINING PROPER CONTROL AND CONFIGURATION FOR
ALL SUCH NETWORKED SYSTEMS HAS
PROVED TO BE IMPOSSIBLE. THIS LOOPHOLE MAKES THE INTERNET SYSTEMS
VULNERABLE TO VARIOUS TYPE OF ATTACKS.
THE OBJECTIVE OF THIS RESEARCH IS TO SYSTEMATICALLY IDENTIFY A WIDE LIST
OF ATTACKS IN TRANSPORT, SESSION AND
APPLICATION LAYERS (HOST LAYERS). 148 EFFECTIVE CONTROLS ARE IDENTIFIED
FOR THE SECURITY ATTACKS IN ADDITION
TO THE 113 STANDARD CONTROLS. THE IDENTIFIED CONTROLS ARE ANALYZED IN
ORDER TO MAP AND CATEGORIZE THEM
TO THE CORRESPONDING SECURITY LAYERS WISE.
CHAPTER 14
UNDERSTANDING ANTI-FORENSICS TECHNIQUES FOR COMBATING DIGITAL SECURITY
BREACHES AND CRIMINAL
ACTIVITY 233
RICARDO MARQUES, PONTIFICIA UNIVERSIDADE CATOLICA DE CAMPINAS, BRAZIL
ALEXANDRE MOTA, PONTIFICIA UNIVERSIDADE CATOLICA DE CAMPINAS, BRAZIL
LIA MOTA, PONTIFICIA UNIVERSIDADE CATOLICA DE CAMPINAS, BRAZIL
THIS CHAPTER DEALS WITH THE UNDERSTANDING OF TECHNIQUES THAT ARE USED TO
CREATE DAMAGE TO THE EXPERT IN
AN INVESTIGATIVE PROCESS. THE NAME USED FOR THESE TECHNIQUES IS CALLED
ANTI-FORENSICS, WHOSE MISSION IS
TO CONCEAL, REMOVE, ALTER EVIDENCE, OR MAKE INACCESSIBLE A CYBERCRIME.
THESE TECHNIQUES AIM TO MAKE
THE WORK OF THE SLOWER EXPERT OR DIFFICULT TO REACH A CONCLUSION;
HOWEVER, THIS CHAPTER WILL EXPLORE SOME
TECHNIQUES USED AS MEASURES TO SUBVERT DIGITAL EVIDENCE THROUGH
ANTI-FORENSIC MEASURES.
CHAPTER 15
VISUAL CRYPTOGRAPHY FOR SECURING IMAGES IN CLOUD 242
PUNITHAVATHI P, VIT UNIVERSITY, CHENNAI CAMPUS, INDIA
GEETHA SUBBIAH, VIT UNIVERSITY- CHENNAI CAMPUS, INDIA
IMAGES ARE BECOMING AN INEVITABLE PART OF KNOWLEDGE IN THE MODERN DAY
SOCIETY. AS DATA IS GROWING
AT A RAPID RATE, COSTS INVOLVED IN STORING AND MAINTAINING DATA IS ALSO
RAISING RAPIDLY. THE BEST ALTERNATE
SOLUTION TO REDUCE THE STORAGE COST IS OUTSOURCING ALL THE DATA TO THE
CLOUD. TO ENSURE CONFIDENTIALITY AND
INTEGRITY OF THE DATA, A SECURITY TECHNIQUE HAS TO BE PROVIDED TO THE
DATA EVEN BEFORE IT IS STORED ON THE
CLOUD USING CRYPTOGRAPHY. AN ATTEMPT IS MADE TO EXPLORE THE POSSIBILITY
OF USAGE OF VISUAL CRYPTOGRAPHY
FOR PROVIDING ROBUST SECURITY TO THE SECRET IMAGE. VISUAL CRYPTOGRAPHY
PROVES TO BE MORE EFFICIENT THAN
OTHER CRYPTOGRAPHY TECHNIQUES BECAUSE IT IS SIMPLE AND DOES NOT REQUIRE
ANY KEY MANAGEMENT TECHNIQUE.
CHAPTER 16
VISUAL SENSOR NETWORKS: CRITICAL INFRASTRUCTURE PROTECTION 263
SUSEELA G, VIT UNIVERSITY, INDIA
ASNATH VICTY PHAMILA Y, VIT UNIVERSITY, INDIA
VISUAL SENSOR NETWORK (VSN) IS A NETWORK OF DISTRIBUTED BATTERY-POWERED
LOW-COST CAMERAS AND CMOS
IMAGE SENSORS, EACH WITH THE CAPABILITY OF CAPTURING, PROCESSING,
SENDING, AND RECEIVING IMAGES. VSN
APPLICATIONS INCLUDE REMOTE MONITORING, SECURITY, ELDERLY ASSISTANCE,
VISUAL UBIQUITY, HOME MONITORING,
TRACKING. THE HIGHLY SENSITIVE NATURE OF IMAGES MAKES SECURITY AND
PRIVACY IN VSNS EVEN MORE IMPORTANT
THAN IN MOST OTHER SENSOR AND DATA NETWORKS. HOWEVER, THE DIRECT USE OF
SECURITY TECHNIQUES DEVELOPED
FOR SCALAR WSN WILL NOT BE SUITABLE FOR VSN DUE TO ITS RESOURCE
CONSTRAINT. HENCE LIGHT WEIGHT SECURITY
MECHANISMS NEED TO BE EXPLORED. IN THIS CHAPTER THE CHALLENGING SECURITY
ISSUES AT VARIOUS LAYERS IN VSN
ARE ADDRESSED. IT ALSO FOSTERS DISCUSSION ON PRIVACY PROTECTION
TECHNIQUES LIKE SUBJECTIVE PRIVACY, VIDEO
MASKING TECHNIQUES AND IDENTIFIES RECENT TRENDS IN VSN SECURITY AND
PRIVACY. A DISCUSSION OF OPEN
RESEARCH ISSUES CONCLUDES THIS CHAPTER.
COMPILATION OF REFERENCES 283
ABOUT THE CONTRIBUTORS 302
INDEX 307
|
any_adam_object | 1 |
author2 | Geetha, S. Phamila, Asnath Victy 1978- |
author2_role | edt edt |
author2_variant | s g sg a v p av avp |
author_GND | (DE-588)1129269787 |
author_facet | Geetha, S. Phamila, Asnath Victy 1978- |
building | Verbundindex |
bvnumber | BV044261138 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)986504159 (DE-599)BVBBV044261138 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02937nam a2200481 c 4500</leader><controlfield tag="001">BV044261138</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190913 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170405s2016 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522501947</subfield><subfield code="9">978-1-5225-0194-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-0193-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)986504159</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044261138</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Combating security breaches and criminal activity in the digital sphere</subfield><subfield code="c">S. Geetha (VIT University, Chennai, India), Asnath Victy Phamila (VIT University, Chennai, India)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">Information Science Reference, an imprint of IGI Global</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 309 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Geetha, S.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phamila, Asnath Victy</subfield><subfield code="d">1978-</subfield><subfield code="0">(DE-588)1129269787</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5225-0193-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-0193-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029666066&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029666066</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044261138 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:58:13Z |
institution | BVB |
isbn | 9781522501947 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029666066 |
oclc_num | 986504159 |
open_access_boolean | |
owner | DE-1049 DE-706 DE-91 DE-BY-TUM DE-573 DE-1050 DE-20 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-1049 DE-706 DE-91 DE-BY-TUM DE-573 DE-1050 DE-20 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xx, 309 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Information Science Reference, an imprint of IGI Global |
record_format | marc |
series2 | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series Premier reference source |
spellingShingle | Combating security breaches and criminal activity in the digital sphere |
title | Combating security breaches and criminal activity in the digital sphere |
title_auth | Combating security breaches and criminal activity in the digital sphere |
title_exact_search | Combating security breaches and criminal activity in the digital sphere |
title_full | Combating security breaches and criminal activity in the digital sphere S. Geetha (VIT University, Chennai, India), Asnath Victy Phamila (VIT University, Chennai, India) |
title_fullStr | Combating security breaches and criminal activity in the digital sphere S. Geetha (VIT University, Chennai, India), Asnath Victy Phamila (VIT University, Chennai, India) |
title_full_unstemmed | Combating security breaches and criminal activity in the digital sphere S. Geetha (VIT University, Chennai, India), Asnath Victy Phamila (VIT University, Chennai, India) |
title_short | Combating security breaches and criminal activity in the digital sphere |
title_sort | combating security breaches and criminal activity in the digital sphere |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0193-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029666066&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT geethas combatingsecuritybreachesandcriminalactivityinthedigitalsphere AT phamilaasnathvicty combatingsecuritybreachesandcriminalactivityinthedigitalsphere |