Unleashing the Art of Digital Forensics
portes grátis
Unleashing the Art of Digital Forensics
Dahiya, Susheela; Kaushik, Keshav; Tanwar, Rohit; Kumar Bhatia, Komal; Wu, Yulei
Taylor & Francis Ltd
10/2024
226
Mole
9781032069890
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
1. Data Hiding-Steganography and Steganalysis
K.N.D. Saile, V.Y. Bharadwaj, and G.Y. Vybhavi
2. International Cyberspace Laws: A Review
Manik Garg, Susheela Dahiya, and Keshav Kaushik
3. Unraveling the Dark Web
Susheela Dahiya, Manik Garg, and Keshav Kaushik
4. Memory Acquisition Process for the Linux and Macintosh-Based Operating System Using Open-Source Tool
Ravi Sheth and Ashish Shukla
5. Deepfakes-A Looming Threat to Our Society
Raahat Devender Singh
6. Challenges in Digital Forensics and Future Aspects
Shreyas S. Muthye
7. Cybercrimes against Women in India: How Can the Law and the Technology Help the Victims?
Sujata Bali
8. Role of Technology and Prevention of Money Laundering
Smita M. Pachare, Suhasini Verma, and Vidhisha Vyas
9. Novel Cryptographic Hashing Technique for Preserving Integrity in Forensic Samples
S. Pooja, Vikas Sagar, and Rohit Tanwar
10. Memory Acquisition and Analysis for Forensic Investigation
Tripti Misra, Vanshika Singh, and Tanisha Singla
11. Forensics in Medical Imaging: Techniques and Tools
Bhavana Kaushik and Keshav Kaushik
12. Exploring Face Detection and Recognition in Steganography
Urmila Pilania, Rohit Tanwar, and Neha Nandal
13. Authentication and Admissibility of Forensic Evidence under Indian Criminal Justice Delivery System: An Analysis
Bharti Nair Khan and Sujata Bali
K.N.D. Saile, V.Y. Bharadwaj, and G.Y. Vybhavi
2. International Cyberspace Laws: A Review
Manik Garg, Susheela Dahiya, and Keshav Kaushik
3. Unraveling the Dark Web
Susheela Dahiya, Manik Garg, and Keshav Kaushik
4. Memory Acquisition Process for the Linux and Macintosh-Based Operating System Using Open-Source Tool
Ravi Sheth and Ashish Shukla
5. Deepfakes-A Looming Threat to Our Society
Raahat Devender Singh
6. Challenges in Digital Forensics and Future Aspects
Shreyas S. Muthye
7. Cybercrimes against Women in India: How Can the Law and the Technology Help the Victims?
Sujata Bali
8. Role of Technology and Prevention of Money Laundering
Smita M. Pachare, Suhasini Verma, and Vidhisha Vyas
9. Novel Cryptographic Hashing Technique for Preserving Integrity in Forensic Samples
S. Pooja, Vikas Sagar, and Rohit Tanwar
10. Memory Acquisition and Analysis for Forensic Investigation
Tripti Misra, Vanshika Singh, and Tanisha Singla
11. Forensics in Medical Imaging: Techniques and Tools
Bhavana Kaushik and Keshav Kaushik
12. Exploring Face Detection and Recognition in Steganography
Urmila Pilania, Rohit Tanwar, and Neha Nandal
13. Authentication and Admissibility of Forensic Evidence under Indian Criminal Justice Delivery System: An Analysis
Bharti Nair Khan and Sujata Bali
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Malware;Forgery;Steganography;Steganalysis;Crime;Digital Forensic;Memory Dump;Open Source Software;Digital Evidence;Forensic Imaging;Face Detection;Dark Web;Execution Time;Image Processing Attacks;Pci DSS;Digital Forensic Examiner;Digital Forensic Expert;Onion Routing;Information Technology Act;Optical Flow Patterns;Cardholder Data;Indian Evidence Act;Hash Function;Face Recognition Methods;Face Detection Methods;Forgery Detection;Optical Flow;DNA Profile;DCT Coefficient;Social Network Analysis Model
1. Data Hiding-Steganography and Steganalysis
K.N.D. Saile, V.Y. Bharadwaj, and G.Y. Vybhavi
2. International Cyberspace Laws: A Review
Manik Garg, Susheela Dahiya, and Keshav Kaushik
3. Unraveling the Dark Web
Susheela Dahiya, Manik Garg, and Keshav Kaushik
4. Memory Acquisition Process for the Linux and Macintosh-Based Operating System Using Open-Source Tool
Ravi Sheth and Ashish Shukla
5. Deepfakes-A Looming Threat to Our Society
Raahat Devender Singh
6. Challenges in Digital Forensics and Future Aspects
Shreyas S. Muthye
7. Cybercrimes against Women in India: How Can the Law and the Technology Help the Victims?
Sujata Bali
8. Role of Technology and Prevention of Money Laundering
Smita M. Pachare, Suhasini Verma, and Vidhisha Vyas
9. Novel Cryptographic Hashing Technique for Preserving Integrity in Forensic Samples
S. Pooja, Vikas Sagar, and Rohit Tanwar
10. Memory Acquisition and Analysis for Forensic Investigation
Tripti Misra, Vanshika Singh, and Tanisha Singla
11. Forensics in Medical Imaging: Techniques and Tools
Bhavana Kaushik and Keshav Kaushik
12. Exploring Face Detection and Recognition in Steganography
Urmila Pilania, Rohit Tanwar, and Neha Nandal
13. Authentication and Admissibility of Forensic Evidence under Indian Criminal Justice Delivery System: An Analysis
Bharti Nair Khan and Sujata Bali
K.N.D. Saile, V.Y. Bharadwaj, and G.Y. Vybhavi
2. International Cyberspace Laws: A Review
Manik Garg, Susheela Dahiya, and Keshav Kaushik
3. Unraveling the Dark Web
Susheela Dahiya, Manik Garg, and Keshav Kaushik
4. Memory Acquisition Process for the Linux and Macintosh-Based Operating System Using Open-Source Tool
Ravi Sheth and Ashish Shukla
5. Deepfakes-A Looming Threat to Our Society
Raahat Devender Singh
6. Challenges in Digital Forensics and Future Aspects
Shreyas S. Muthye
7. Cybercrimes against Women in India: How Can the Law and the Technology Help the Victims?
Sujata Bali
8. Role of Technology and Prevention of Money Laundering
Smita M. Pachare, Suhasini Verma, and Vidhisha Vyas
9. Novel Cryptographic Hashing Technique for Preserving Integrity in Forensic Samples
S. Pooja, Vikas Sagar, and Rohit Tanwar
10. Memory Acquisition and Analysis for Forensic Investigation
Tripti Misra, Vanshika Singh, and Tanisha Singla
11. Forensics in Medical Imaging: Techniques and Tools
Bhavana Kaushik and Keshav Kaushik
12. Exploring Face Detection and Recognition in Steganography
Urmila Pilania, Rohit Tanwar, and Neha Nandal
13. Authentication and Admissibility of Forensic Evidence under Indian Criminal Justice Delivery System: An Analysis
Bharti Nair Khan and Sujata Bali
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Malware;Forgery;Steganography;Steganalysis;Crime;Digital Forensic;Memory Dump;Open Source Software;Digital Evidence;Forensic Imaging;Face Detection;Dark Web;Execution Time;Image Processing Attacks;Pci DSS;Digital Forensic Examiner;Digital Forensic Expert;Onion Routing;Information Technology Act;Optical Flow Patterns;Cardholder Data;Indian Evidence Act;Hash Function;Face Recognition Methods;Face Detection Methods;Forgery Detection;Optical Flow;DNA Profile;DCT Coefficient;Social Network Analysis Model