LEADER 06055nam 2200493 450 001 9910554250903321 005 20231110222351.0 010 $a3-11-067747-4 024 7 $a10.1515/9783110677478 035 $a(CKB)5590000000554965 035 $a(MiAaPQ)EBC6739251 035 $a(Au-PeEL)EBL6739251 035 $a(OCoLC)1266228156 035 $a(DE-B1597)536547 035 $a(DE-B1597)9783110677478 035 $a(EXLCZ)995590000000554965 100 $a20220626d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCyber crime and forensic computing $emodern principles, practices, and algorithms. /$fedited by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma 210 1$aBerlin ;$aBoston :$cWalter de Gruyter GmbH,$d[2021] 210 4$dİ2021 215 $a1 online resource (242 pages) 225 1 $aDe Gruyter Frontiers in Computational Intelligence ;$vv.11 311 $a3-11-067737-7 327 $aIntro -- Contents -- About the editors -- A survey of popular digital forensic tools -- An insight review on multimedia forensics technology -- An overview on advanced multimedia forensic techniques and future direction -- Computer forensics and Cyber Crimes: COVID-19 perspective -- Biometric forensic tools for criminal investigation -- Deep learning for optimization of e-evidence -- Electronic voting machine security issues and solution protocol by physical unclonable function -- Machine learning for mobile malware analysis -- Mobile platform security: issues and countermeasures -- Data leakage detection in Wi-Fi networks -- Index. 330 $aThis book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today?s organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders? abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature. 410 0$aDe Gruyter frontiers in computational intelligence ;$v11. 606 $aComputer crimes 615 0$aComputer crimes. 676 $a364.168 702 $aShrivastava$b Gulshan$f1987- 702 $aGupta$b Deepak 702 $aSharma$b Kavita 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910554250903321 996 $aCyber crime and forensic computing$92885778 997 $aUNINA LEADER 02979nam 2200625Ia 450 001 9911019814003321 005 20200520144314.0 010 $a9786611069391 010 $a9781281069399 010 $a1281069396 010 $a9780470692288 010 $a0470692286 010 $a9780470765920 010 $a0470765925 035 $a(CKB)1000000000410808 035 $a(EBL)320040 035 $a(OCoLC)476116326 035 $a(SSID)ssj0000103454 035 $a(PQKBManifestationID)11121908 035 $a(PQKBTitleCode)TC0000103454 035 $a(PQKBWorkID)10081370 035 $a(PQKB)10918484 035 $a(MiAaPQ)EBC320040 035 $a(Perlego)2751183 035 $a(EXLCZ)991000000000410808 100 $a20070829d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aAnesthesia for cardiac surgery 205 $a3rd ed. /$bJames A. DiNardo, David A. Zvara. 210 $aMalden, Mass. ;$aOxford $cBlackwell$d2008 215 $a1 online resource (474 p.) 300 $aPrevious ed.: / by James A. DiNardo. Stamford, Conn.: Appleton & Lange; London: Prentice Hall International, 1998. 311 08$a9781405153638 311 08$a1405153636 320 $aIncludes bibliographical references and index. 327 $aAnesthesia for Cardiac Surgery; Contents; Preface; 1 Introduction; 2 Myocardial Physiology and the Interpretation of Cardiac Catheterization Data; 3 Monitoring; 4 Anesthesia for Myocardial Revascularization; 5 Anesthesia for Valvular Heart Disease; 6 Congenital Heart Disease; 7 Anesthesia for Heart,Heart-Lung, and Lung Transplantation; 8 Pericardial Disease; 9 Anesthesia for Surgery of the Thoracic Aorta; 10 Managementof Cardiopulmonary Bypass; 11 Mechanical Circulatory Support; 12 Myocardial Preservation duringCardiopulmonary Bypass; 13 Special Considerations during Cardiac Surgery; Index 330 $aThis comprehensive, state of the art overview of pediatric and adult cardiac anesthesia brings together all the latest developments in this rapidly developing field. This text is intended both as a reference and for daily use by practicing and prospective anesthesiologists. Thoroughly updated for its third edition, Anesthesia for Cardiac Surgery fills the gap between encyclopaedic references and brief outlines, presenting just the right amount of information to guide trainees and practitioners who care for cardiac surgical patients. This edition features:The in 606 $aAnesthesia in cardiology 606 $aHeart$xSurgery 615 0$aAnesthesia in cardiology. 615 0$aHeart$xSurgery. 676 $a617.967412 700 $aDiNardo$b James A$0968019 701 $aZvara$b David A$0968020 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019814003321 996 $aAnesthesia for cardiac surgery$92198481 997 $aUNINA