NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Crime science and digital forensics (Record no. 4519)

MARC details
000 -LEADER
fixed length control field 05073cam a2200541Mi 4500
001 - CONTROL NUMBER
control field 9780429322877
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122822.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210709s2021 flu ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000405958
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000405958
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000405965
Qualifying information (ePub ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000405966
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780429322877
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0429322879
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367322557
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0367322552
024 8# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9780429322877
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1259508801
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1259508801
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8073
072 #7 - SUBJECT CATEGORY CODE
Subject category code LAW
Subject category code subdivision 041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code POL
Subject category code subdivision 035000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 017000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code JKV
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.250285
Edition number 23
245 00 - TITLE STATEMENT
Title Crime science and digital forensics
Medium [electronic resource] :
Remainder of title a holistic view /
Statement of responsibility, etc. editors, Anthony C. Ijeh, Kevin Curran.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note <P><STRONG>PART 1: CRIME SCIENCE </STRONG></P><P><STRONG>Unraveling the Notre-Dame Cathedral Fire in Space and Time</STRONG><STRONG>: </STRONG><STRONG>An X-coherence Approach</STRONG><I> </P><P>Rafael Padilha, Fernanda A. Andaló, Luís A. M. Pereira, Anderson Rocha</P></I><P></P><B><P>Using Gesture Recognition to Prevent Drowning: A Crime Science Perspective</P></B><I><P>Anthony C. Ijeh</P><P></P></I><B><P>Modelling Criminal Investigation: Process, Quality and Requirements</P></B><I><P>Stig Andersen, Jens P. Fossdal,</I> and<I> Oslo Police District</P></I><P></P><B><P>Digital Investigation and the Trojan Défense, Revisited</P></B><I><P>Golden G. Richard III, Andrew Case, Modhuparna Manna, Elsa A. M. Hahne, Aisha Ali-Gombe</I><B></P><P>PART 2: DIGITAL FORENSICS</P><P>Law Enforcement Agencies in Europe and the use of Hacking Tools During Investigations: Some Legal Informatics, Civil Rights and Data Protection Issues.</P></B><I><P>Giovanni Ziccardi</P></I><P></P><B><P>Mobile Forensics -- Tools, Techniques and Approach</P></B><I><P>Manish Kumar</P></I><P></P><B><P>Digital Forensics of Cyber Physical Systems and the Internet of Things</P></B><I><P>Sandhya Armoogum, Patricia Khonje, Xiaoming Li</P></I><P></P><B><P>Social Media Crime Investigation and Forensic Analysis</P></B><I><P>Manish Kumar</P></I><P></P><B><P>PART 3: CYBER SECURITY</P><P>Bayesian Networks and Cyber-crime Investigations</P></B><I><P>Richard E. Overill, </I>and<I> Kam-Pui Chow</P></I><P></P><B><P>The Future of Democracy in a Cyber-Security Framework</P></B><I><P>Marios P. Efthymiopoulos, Kleanthis Kyriakidis</P></I><P></P><B><P>Is it a Cyber Security Strategy for Social Development?</B><I> </P><P>Anthony C Ijeh</P></I><P></P><B><P>NATO's Current and Future Cyber-Defence Adaptability</P></B><I><P>Marios P. Efthymiopoulos</P></I>
520 ## - SUMMARY, ETC.
Summary, etc. This volume is a collation of articles on counter forensics practices and digital investigative methods from the perspective of crime science. The book also shares alternative dialogue on information security techniques used to protect data from unauthorised access and manipulation. Scandals such as those at OPCW and Gatwick Airport have reinforced the importance of crime science and the need to take proactive measures rather than a wait and see approach currently used by many organisations. This book proposes a new approach in dealing with cybercrime and unsociable behavior involving remote technologies using a combination of evidence-based disciplines in order to enhance cybersecurity and authorised controls. It starts by providing a rationale for combining selected disciplines to enhance cybersecurity by discussing relevant theories and highlighting the features that strengthen privacy when mixed. The essence of a holistic model is brought about by the challenge facing digital forensic professionals within environments where tested investigative practices are unable to provide satisfactory evidence and security. This book will be of interest to students, digital forensic and cyber security practitioners and policy makers. It marks a new route in the study of combined disciplines to tackle cybercrime using digital investigations and crime science.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Criminal investigation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Digital forensic science.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element LAW / Forensic Science
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element POLITICAL SCIENCE / Political Freedom & Security / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Cybernetics
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ijeh, Anthony C.,
Dates associated with a name 1971-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Curran, Kevin,
Dates associated with a name 1969-
Relator term editor.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9780429322877">https://www.taylorfrancis.com/books/9780429322877</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.