Combating security breaches and criminal activity in the digital sphere / S. Geetha and Asnath Victy Phamila, editors.
Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Description: PDFs (309 pages) : illustrationsContent type:- text
- electronic
- online resource
- 9781522501947
- 363.25/968 23
- HV6773 .C6495 2016e
- Also available in print.

Includes bibliographical references and index.
A review on digital sphere threats and vulnerabilities / Muthuramalingam S., Thangavel M., Sridhar S. -- Advances in biometrics for secure human authentication system: biometric authentication system / Jagannath Mohan, Adalarasu Kanagasabai, Vetrivelan Pandu -- Against spoofing attacks in network layer / Kavisankar L., Chellappan C., Poovammal E. -- Classification of cybercrimes and punishments under the Information Technology Act, 2000 / Sree Krishna Bharadwaj H. -- Cloud crime and fraud: a study of challenges for cloud security and forensics / Nimisha Singh -- Combating cyber security breaches in digital world using misuse detection methods: misuse detection / Subbulakshmi T. -- Critical video surveillance and identification of human behavior analysis of ATM security systems / M. Sivabalakrishnan, R. Menaka, S. Jeeva -- Digital evidence in practice: procedure and tools / Uma N. Dulhare, Shaik Rasool -- Digital forensic and machine learning / Poonkodi Mariappan, Padhmavathi B., Talluri Srinivasa Teja -- Effective recognition of stereo image concealed media of interpolation error with difference expansion / Hemalatha J., Kavitha Devi M. K. -- Mobile malware / Geogen G., Poovammal E. -- Network intrusion detection and prevention systems on flooding and worm attacks / P. Vetrivelan, M. Jagannath, T. S. Pradeep Kumar -- A systematic mapping of security mechanisms / Gayathri RajaKumaran, NeelaNarayanan Venkataraman --
Understanding anti-forensics techniques for combating digital security breaches and criminal activity / Ricardo Marques, Alexandre Mota, Lia Mota -- Visual cryptography for securing images in cloud / Punithavathi P, Geetha Subbiah -- Visual sensor networks: critical infrastructure protection / Suseela G, Asnath Victy Phamila Y.
Restricted to subscribers or individual electronic text purchasers.
"This book is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users"--Provided by publisher.
Also available in print.
Mode of access: World Wide Web.
Description based on title screen (IGI Global, viewed 06/18/2016).