Reference Hub25
Indices1
Handbook of Research on Network Forensics and Analysis Techniques

Handbook of Research on Network Forensics and Analysis Techniques

Copyright: © 2018 |Pages: 509
ISBN13: 9781522541004|ISBN10: 1522541004|EISBN13: 9781522541011
DOI: 10.4018/978-1-5225-4100-4
Cite Book Cite Book

MLA

Shrivastava, Gulshan, et al., editors. Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4100-4

APA

Shrivastava, G., Kumar, P., Gupta, B. B., Bala, S., & Dey, N. (Eds.). (2018). Handbook of Research on Network Forensics and Analysis Techniques. IGI Global. https://doi.org/10.4018/978-1-5225-4100-4

Chicago

Shrivastava, Gulshan, et al., eds. Handbook of Research on Network Forensics and Analysis Techniques. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4100-4

Export Reference

Mendeley
Favorite Full-Book Download

With the rapid advancement in technology, myriad new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes.

The Handbook of Research on Network Forensics and Analysis Techniques is a current research publication that examines the advancements and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring coverage on a broad range of topics including cryptocurrency, hand-based biometrics, and cyberterrorism, this publication is geared toward professionals, computer forensics practitioners, engineers, researchers, and academics seeking relevant research on the development of forensic tools.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Security in Network, Social IoT and VANET, Denial of Service Attack
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Cyber Crime and Cyber Forensics
This content has been removed at the discretion of the publisher and the editors.
Security and Privacy in Big Data Analytics and Machine Learning, Biometrics, Audio Watermarking, and Cryptocurrency
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.