Cyber Crime and Forensic Computing : (Record no. 84438)

000 -LEADER
fixed length control field 11257nam a22012735i 4500
001 - CONTROL NUMBER
control field 9783110677478
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730161550.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230228t20212021gw fo d z eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783110677478
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title
084 ## - OTHER CLASSIFICATION NUMBER
-- DE-Ofb1/22
-- (DE-625)rvk/143650:
245 00 - TITLE STATEMENT
Title Cyber Crime and Forensic Computing :
Sub Title Modern Principles, Practices, and Algorithms /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (X, 230 p.)
490 0# - SERIES STATEMENT
Series statement De Gruyter Frontiers in Computational Intelligence ,
520 ## - SUMMARY, ETC.
Summary, etc This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.
700 1# - AUTHOR 2
Author 2 Agarwal, Prerna,
700 1# - AUTHOR 2
Author 2 Arora, Shefali,
700 1# - AUTHOR 2
Author 2 Bhatia, M. P. S.,
700 1# - AUTHOR 2
Author 2 Garg, Puneet,
700 1# - AUTHOR 2
Author 2 Gupta, Deepak,
700 1# - AUTHOR 2
Author 2 Gupta, Deepak,
700 1# - AUTHOR 2
Author 2 Gupta, Swati,
700 1# - AUTHOR 2
Author 2 Hariharan, K.,
700 1# - AUTHOR 2
Author 2 Kumar, Ambeshwar,
700 1# - AUTHOR 2
Author 2 Kumar, Prashant,
700 1# - AUTHOR 2
Author 2 Kumar, Sachil,
700 1# - AUTHOR 2
Author 2 Kumari, Meet,
700 1# - AUTHOR 2
Author 2 Manikandan, R.,
700 1# - AUTHOR 2
Author 2 Meenakshi,,
700 1# - AUTHOR 2
Author 2 Mittal, Ruchi,
700 1# - AUTHOR 2
Author 2 Purohit, Gaurav,
700 1# - AUTHOR 2
Author 2 Rajkumar, K.,
700 1# - AUTHOR 2
Author 2 Raju, Solomon,
700 1# - AUTHOR 2
Author 2 Saxena, Geetika,
700 1# - AUTHOR 2
Author 2 Selvakumari, R. Shantha,
700 1# - AUTHOR 2
Author 2 Sharma, Anand,
700 1# - AUTHOR 2
Author 2 Sharma, Kavita,
700 1# - AUTHOR 2
Author 2 Sharma, Kavita,
700 1# - AUTHOR 2
Author 2 Shrivastava, Gulshan,
700 1# - AUTHOR 2
Author 2 Shrivastava, Pranav,
700 1# - AUTHOR 2
Author 2 Sivasankari, N.,
700 1# - AUTHOR 2
Author 2 Tanwar, Pramod,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1515/9783110677478
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.degruyter.com/isbn/9783110677478
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.degruyter.com/document/cover/isbn/9783110677478/original
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Berlin ;
-- Boston :
-- De Gruyter,
-- [2021]
264 #4 -
-- ©2021
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
588 0# -
-- Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)
650 #4 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Algorithmus.
650 #4 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Big Data.
650 #4 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computerforensik.
650 #4 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Forensische Informatik.
650 #4 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Künstliche Intelligenz.
650 #4 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Maschinelles Lernen.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Intelligence (AI) & Semantics.
912 ## -
-- 978-3-11-065906-1 De Gruyter English eBooks 2020 - UC
-- 2020
912 ## -
-- 978-3-11-075070-6 DG Plus DeG Package 2021 Part 1
-- 2021
912 ## -
-- 978-3-11-075072-0 DG Ebook Package English 2021
-- 2021
912 ## -
-- 978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English
-- 2021
912 ## -
-- 978-3-11-075407-0 EBOOK PACKAGE Engineering, Computer Sciences 2021 English
-- 2021
912 ## -
-- EBA_CL_CHCOMSGSEN
912 ## -
-- EBA_CL_LAEC
912 ## -
-- EBA_DGALL
912 ## -
-- EBA_EBKALL
912 ## -
-- EBA_ECL_CHCOMSGSEN
912 ## -
-- EBA_ECL_LAEC
912 ## -
-- EBA_EEBKALL
912 ## -
-- EBA_ESSHALL
912 ## -
-- EBA_ESTMALL
912 ## -
-- EBA_SSHALL
912 ## -
-- EBA_STMALL
912 ## -
-- GBV-deGruyter-alles
912 ## -
-- PDA11SSHE
912 ## -
-- PDA12STME
912 ## -
-- PDA13ENGE
912 ## -
-- PDA17SSHEE
912 ## -
-- PDA18STMEE
912 ## -
-- PDA5EBK
912 ## -
-- ZDB-23-DEI
-- 2021
912 ## -
-- ZDB-23-DGG
-- 2021

No items available.