|
![]() |
|||
|
||||
OverviewThis book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court. Full Product DetailsAuthor: Aboul Ella Hassanien , Mohamed Mostafa Fouad , Azizah Abdul Manaf , Mazdak ZamaniPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: Softcover reprint of the original 1st ed. 2017 Volume: 115 Dimensions: Width: 15.50cm , Height: 2.20cm , Length: 23.50cm Weight: 0.652kg ISBN: 9783319830261ISBN 10: 3319830260 Pages: 414 Publication Date: 28 June 2018 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsPart 1: Forensic Analysis in Cloud Computing.- Part 2: Forensics Multimedia and Watermarking Techniques.- Part 3: Digital Forensic Applications.ReviewsThe book discusses sparingly some techniques from multimedia forensics and watermarking. It is well organized and informative. ... practitioners, researchers, faculty, and students of computer security, cybercrime, and public policy will find this book useful. It is suitable for teaching courses on multimedia forensics and security. I recommend it for its intended readers. (Computing Reviews, November, 2017) Author InformationTab Content 6Author Website:Countries AvailableAll regions |