000 | 03652nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-981-99-5091-1 | ||
003 | DE-He213 | ||
005 | 20240730170431.0 | ||
007 | cr nn 008mamaa | ||
008 | 231101s2024 si | s |||| 0|eng d | ||
020 |
_a9789819950911 _9978-981-99-5091-1 |
||
024 | 7 |
_a10.1007/978-981-99-5091-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security, Privacy and Digital Forensics _h[electronic resource] : _bSelect Proceedings of the International Conference, ICISPD 2022 / _cedited by Sankita J. Patel, Naveen Kumar Chaudhary, Bhavesh N. Gohil, S. S. Iyengar. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXII, 418 p. 167 illus., 128 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1119 ; _v1075 |
|
505 | 0 | _aCyber Security Resiliency for Airports as a Critical Infrastructure -- Re-examining Laws pertaining to Admissibility of Digital Evidence in Investigations -- Fog Forensics: A Comprehensive Review of Forensic Models for Fog Computing Environment -- Memory Forensics for Artefacts Recovery From Ether Transactions -- A Lightweight Intrusion detection and Electricity Theft Detection System for Smart Grid. | |
520 | _aThis volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022). The content discusses novel contributions and latest developments in cyber-attacks and defenses, computer forensics and cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, hardware security, among others. This volume will be a useful guide for researchers across industry and academia working in the field of security, privacy, and digital forensics from both technological and social perspectives. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _993516 |
650 | 2 | 4 |
_aComputer Communication Networks. _993520 |
700 | 1 |
_aPatel, Sankita J. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993521 |
|
700 | 1 |
_aChaudhary, Naveen Kumar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993522 |
|
700 | 1 |
_aGohil, Bhavesh N. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993523 |
|
700 | 1 |
_aIyengar, S. S. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993525 |
|
710 | 2 |
_aSpringerLink (Online service) _993527 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819950904 |
776 | 0 | 8 |
_iPrinted edition: _z9789819950928 |
776 | 0 | 8 |
_iPrinted edition: _z9789819950935 |
830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1119 ; _v1075 _993529 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-99-5091-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c86939 _d86939 |