LEADER 00975nam0-2200325---450- 001 990009394610403321 005 20110711120455.0 010 $a9780521743525 035 $a000939461 035 $aFED01000939461 035 $a(Aleph)000939461FED01 035 $a000939461 100 $a20110711d2009----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $aa-------001yy 200 1 $a<>art of being a scientist$ea guide for graduate students and their mentors$fRoel Snieder and Ken Larner 210 $aCambridge$cCambridge university press$d2009 215 $aX, 286 p.$cill.$d23 cm 610 0 $aScienza$aMetodologia$aManuali 676 $a502.3$v22$zita 700 1$aSnieder,$bRoel$0511898 701 1$aLarner,$bRobert J.$0511899 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009394610403321 952 $a60 502.3 B 1$b12977$fFAGBC 959 $aFAGBC 996 $aArt of being a scientist$9763738 997 $aUNINA LEADER 01382nam2-2200409---450- 001 990000910260203316 005 20120605150646.0 010 $a88-14-01981-9 035 $a0091026 035 $aUSA010091026 035 $a(ALEPH)000091026USA01 035 $a0091026 100 $a20020128d1990----y0itay0103 ba 101 $aita 102 $aIT 105 $a00||| 200 1 $aPercorsi scientifici$fCesare Pinelli$v1 210 $aMilano$cA. Giuffrè$d1990 215 $aVIII, 271 p.$d26 cm 225 2 $aPubblicazioni della Facoltà di giurisprudenza, Università di Macerata$h2. ser.$v61 410 0$1001000346736$i2001$v, 61$aPubblicazioni della Facoltà di giurisprudenza 461 $10010091025$12001$aCostituzione e principio di esclusività 700 1$aPINELLI,$bCesare$0148488 801 0$aIT$bsalbc$gISBD 912 $a990000910260203316 951 $aXXX.A. Coll. 3/ 37 1 (X 9 I 61)$b68974 EC$cXXX.A. Coll. 3/ 37 1 (X 9)$d00287397 959 $aBK 969 $aGIU 979 $aPATTY$b90$c20020128$lUSA01$h1202 979 $aPATTY$b90$c20020128$lUSA01$h1203 979 $aCHIARA$b90$c20020321$lUSA01$h1026 979 $c20020403$lUSA01$h1734 979 $aPATRY$b90$c20040406$lUSA01$h1703 979 $aRSIAV4$b90$c20100823$lUSA01$h1144 979 $aPATRY$b90$c20120605$lUSA01$h1506 996 $aPercorsi scientifici$9897513 997 $aUNISA LEADER 04982nam 22006975 450 001 9910337578403321 005 20200704051809.0 010 $a3-030-15210-3 024 7 $a10.1007/978-3-030-15210-9 035 $a(CKB)4100000007810238 035 $a(MiAaPQ)EBC5732710 035 $a(DE-He213)978-3-030-15210-9 035 $a(PPN)235232912 035 $a(EXLCZ)994100000007810238 100 $a20190315d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity in Nigeria $eA Case Study of Surveillance and Prevention of Digital Crime /$fby Aamo Iorliam 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (68 pages) 225 1 $aSpringerBriefs in Cybersecurity,$x2193-973X 311 $a3-030-15209-X 327 $aIntroduction -- Natural Laws (Benford?s Law and Zipf?s Law) for Network Traf?c Analysis -- Combination of Natural Laws (Benford?s Law and Zipf?s Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software. 330 $aThis book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country?s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria?s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria?s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford?s Law and Zipf?s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues. 410 0$aSpringerBriefs in Cybersecurity,$x2193-973X 606 $aComputer networks$xSecurity measures 606 $aComputer crimes 606 $aAfrica?Economic conditions 606 $aComputer networks 606 $aBiometry 606 $aComputers 606 $aLaw and legislation 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aCybercrime$3https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 606 $aAfrican Economics$3https://scigraph.springernature.com/ontologies/product-market-codes/W45020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aBiometrics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aComputer networks$xSecurity measures. 615 0$aComputer crimes. 615 0$aAfrica?Economic conditions. 615 0$aComputer networks. 615 0$aBiometry. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aMobile and Network Security. 615 24$aCybercrime. 615 24$aAfrican Economics. 615 24$aComputer Communication Networks. 615 24$aBiometrics. 615 24$aLegal Aspects of Computing. 676 $a005.8 700 $aIorliam$b Aamo$4aut$4http://id.loc.gov/vocabulary/relators/aut$0952981 906 $aBOOK 912 $a9910337578403321 996 $aCybersecurity in Nigeria$92504537 997 $aUNINA