01245nam a22002531i 450099100125221970753620030226093456.0021204suuuu rm |||||||||||||||||rum b12121228-39ule_instARCHE-021102ExLDip.to Filologia Ling. e Lett.itaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.Dictionarul limbei istorice si poporane a Romanilor /B. Petriceicu, Hasdeu ; editie ingrijita si studiu introductiv de Grigore BrancusBucuresti :Stabilimentul Grafici V. Socescu,[s.d.]2 v. ;30 cmEtymologicum Magnum RomaniaeHasdeu, Bogdan Petriceicuauthorhttp://id.loc.gov/vocabulary/relators/aut322582Brancus, Grigore.b1212122802-04-1401-04-03991001252219707536LE008 Ist. Glott. V 129V. 11LE008IG-7637le008-E0.00-l- 00000.i1243278701-04-03LE008 Ist. Glott. V 129/IV. 21LE008IG-7636le008-E0.00-l- 00000.i1243279901-04-03Dictionarul limbei istorice si poporane a Romanilor1457889UNISALENTOle00801-04-03ma -rumrm 0203515nam 22007455 450 991029931470332120200705070503.03-319-94499-110.1007/978-3-319-94499-9(CKB)3810000000358782(MiAaPQ)EBC5441152(DE-He213)978-3-319-94499-9(PPN)229495621(EXLCZ)99381000000035878220180628d2018 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierFundamental Computing Forensics for Africa A Case Study of the Science in Nigeria /by Aamo Iorliam1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (111 pages)SpringerBriefs in Computer Science,2191-57683-319-94498-3 Includes bibliographical references and index.Chapter 1. Introduction -- Chapter 2. History of Forensic Science -- Chapter 3. Subdivisions of Forensic Science -- Chapter 4. Forensic Tools for Different Subdivisions -- Chapter 5. Forensics and Biometrics Importance -- Chapter 6. Impact of Forensic Science and Bodies that Need Forensic Science in Nigeria.This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford’s law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular.SpringerBriefs in Computer Science,2191-5768Data encryption (Computer science)Computer securityComputer crimesComputer networksBiometryComputersLaw and legislationCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cybercrimehttps://scigraph.springernature.com/ontologies/product-market-codes/1B7000Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Biometricshttps://scigraph.springernature.com/ontologies/product-market-codes/I22040Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Data encryption (Computer science)Computer security.Computer crimes.Computer networks.Biometry.Computers.Law and legislation.Cryptology.Systems and Data Security.Cybercrime.Computer Communication Networks.Biometrics.Legal Aspects of Computing.363.25968Iorliam Aamoauthttp://id.loc.gov/vocabulary/relators/aut952981MiAaPQMiAaPQMiAaPQBOOK9910299314703321Fundamental Computing Forensics for Africa2154572UNINA