Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…
Table of Contents Ch. 1. Computer forensics in today's world Ch. 2. Digital forensics: an overview Ch. 3. Developing an enterprise digital investigative/electronic discovery capability Ch. 4. Integrating a quality assurance program in a digital forensic laboratory Ch. 5. Balancing e-discovery challenges with legal and IT requirements Ch. 6. Forensic software and hardware Ch. 7. Incide…
Table of Contents About the Authors Foreword Preface Introduction Chapter 1: General principles of cyber guerilla Abstract Introduction The essence of cyber guerilla Cyber guerilla strategy Cyber guerilla tactics Cyber warfare on favorable terrain (When to wage guerilla) Cyber warfare on unfavorable terrai…
Table of Contents 1. Overview: The OS X operating system 2. Current and past threats 3. Vulnerabilities 4. Malicious Code 5. Exploit development and research 6. Rootkits 7. Defense and protection 8. Detecting malicious code; rootkits 9. Protecting against exploits 10. Locking down services and firewall policies 11. Future threats and mali…
Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…
Contents: Section 1 Information hiding for audio and speech Chapter 1 Information hiding for audio and signals Chapter 2 Reversible audio data hiding in spectral and time domains Chapter 3 Method of digital-audio watermarking basec on cochlear delay characteristics Chapter 4 Information hiding using interpolation for audio and speech signals Chapter 5 Acoustic OFDM technology ans …
Table of content: 1. Introduction and literature survey 1.1 Intrduction 1.2 Computer imaging system 1.3 Attacks, services, and mechanisms 1.4 Security services 1.5 Attacks 1.6 Security attacks 1.7 The aim of thesis 1.8 Related literature & historical review 1.9 Scope of thesis 2. Theoretical principles and measures 2.1 Introduction 2.2 Image file formats 2.3 Key security 2.4 Sy…
Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…
Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …
Contents : Part I Preliminary considerations Chapter 1. The selection of a research approach The three approaches to research Three components involved in an approach Research approaches as worldviews Design and methods Criteria for selecting a research approach Summary Additional readings Chapter 2. Review of the literature The research topic The literature review Summary Ad…