000 | 05073cam a2200541Mi 4500 | ||
---|---|---|---|
001 | 9780429322877 | ||
003 | FlBoTFG | ||
005 | 20240213122822.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 210709s2021 flu ob 001 0 eng d | ||
040 |
_aOCoLC-P _beng _cOCoLC-P |
||
020 |
_a9781000405958 _q(electronic bk.) |
||
020 |
_a1000405958 _q(electronic bk.) |
||
020 |
_a9781000405965 _q(ePub ebook) |
||
020 | _a1000405966 | ||
020 |
_a9780429322877 _q(electronic bk.) |
||
020 |
_a0429322879 _q(electronic bk.) |
||
020 | _z9780367322557 | ||
020 | _z0367322552 | ||
024 | 8 |
_a10.1201/9780429322877 _2doi |
|
035 | _a(OCoLC)1259508801 | ||
035 | _a(OCoLC-P)1259508801 | ||
050 | 4 | _aHV8073 | |
072 | 7 |
_aLAW _x041000 _2bisacsh |
|
072 | 7 |
_aPOL _x035000 _2bisacsh |
|
072 | 7 |
_aCOM _x017000 _2bisacsh |
|
072 | 7 |
_aJKV _2bicssc |
|
082 | 0 | 4 |
_a363.250285 _223 |
245 | 0 | 0 |
_aCrime science and digital forensics _h[electronic resource] : _ba holistic view / _ceditors, Anthony C. Ijeh, Kevin Curran. |
264 | 1 |
_aBoca Raton : _bCRC Press, _c2021. |
|
300 | _a1 online resource | ||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
505 | 0 | _a<P><STRONG>PART 1: CRIME SCIENCE </STRONG></P><P><STRONG>Unraveling the Notre-Dame Cathedral Fire in Space and Time</STRONG><STRONG>: </STRONG><STRONG>An X-coherence Approach</STRONG><I> </P><P>Rafael Padilha, Fernanda A. Andaló, Luís A. M. Pereira, Anderson Rocha</P></I><P></P><B><P>Using Gesture Recognition to Prevent Drowning: A Crime Science Perspective</P></B><I><P>Anthony C. Ijeh</P><P></P></I><B><P>Modelling Criminal Investigation: Process, Quality and Requirements</P></B><I><P>Stig Andersen, Jens P. Fossdal,</I> and<I> Oslo Police District</P></I><P></P><B><P>Digital Investigation and the Trojan Défense, Revisited</P></B><I><P>Golden G. Richard III, Andrew Case, Modhuparna Manna, Elsa A. M. Hahne, Aisha Ali-Gombe</I><B></P><P>PART 2: DIGITAL FORENSICS</P><P>Law Enforcement Agencies in Europe and the use of Hacking Tools During Investigations: Some Legal Informatics, Civil Rights and Data Protection Issues.</P></B><I><P>Giovanni Ziccardi</P></I><P></P><B><P>Mobile Forensics -- Tools, Techniques and Approach</P></B><I><P>Manish Kumar</P></I><P></P><B><P>Digital Forensics of Cyber Physical Systems and the Internet of Things</P></B><I><P>Sandhya Armoogum, Patricia Khonje, Xiaoming Li</P></I><P></P><B><P>Social Media Crime Investigation and Forensic Analysis</P></B><I><P>Manish Kumar</P></I><P></P><B><P>PART 3: CYBER SECURITY</P><P>Bayesian Networks and Cyber-crime Investigations</P></B><I><P>Richard E. Overill, </I>and<I> Kam-Pui Chow</P></I><P></P><B><P>The Future of Democracy in a Cyber-Security Framework</P></B><I><P>Marios P. Efthymiopoulos, Kleanthis Kyriakidis</P></I><P></P><B><P>Is it a Cyber Security Strategy for Social Development?</B><I> </P><P>Anthony C Ijeh</P></I><P></P><B><P>NATO's Current and Future Cyber-Defence Adaptability</P></B><I><P>Marios P. Efthymiopoulos</P></I> | |
520 | _aThis volume is a collation of articles on counter forensics practices and digital investigative methods from the perspective of crime science. The book also shares alternative dialogue on information security techniques used to protect data from unauthorised access and manipulation. Scandals such as those at OPCW and Gatwick Airport have reinforced the importance of crime science and the need to take proactive measures rather than a wait and see approach currently used by many organisations. This book proposes a new approach in dealing with cybercrime and unsociable behavior involving remote technologies using a combination of evidence-based disciplines in order to enhance cybersecurity and authorised controls. It starts by providing a rationale for combining selected disciplines to enhance cybersecurity by discussing relevant theories and highlighting the features that strengthen privacy when mixed. The essence of a holistic model is brought about by the challenge facing digital forensic professionals within environments where tested investigative practices are unable to provide satisfactory evidence and security. This book will be of interest to students, digital forensic and cyber security practitioners and policy makers. It marks a new route in the study of combined disciplines to tackle cybercrime using digital investigations and crime science. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 | _aCriminal investigation. | |
650 | 0 | _aDigital forensic science. | |
650 | 7 |
_aLAW / Forensic Science _2bisacsh |
|
650 | 7 |
_aPOLITICAL SCIENCE / Political Freedom & Security / General _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Cybernetics _2bisacsh |
|
700 | 1 |
_aIjeh, Anthony C., _d1971- _eeditor. |
|
700 | 1 |
_aCurran, Kevin, _d1969- _eeditor. |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9780429322877 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
999 |
_c4519 _d4519 |