Reference Hub1
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software

Copyright: © 2011 |Pages: 374
ISBN13: 9781609605155|ISBN10: 1609605152|EISBN13: 9781609605162
DOI: 10.4018/978-1-60960-515-5
Cite Book Cite Book

MLA

Li, Chang-Tsun, and Anthony T. S. Ho, editors. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software. IGI Global, 2011. https://doi.org/10.4018/978-1-60960-515-5

APA

Li, C. & Ho, A. T. (Eds.). (2011). New Technologies for Digital Crime and Forensics: Devices, Applications, and Software. IGI Global. https://doi.org/10.4018/978-1-60960-515-5

Chicago

Li, Chang-Tsun, and Anthony T. S. Ho, eds. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-515-5

Export Reference

Mendeley
Favorite Full-Book Download

Central to understanding and combating digital crime is the ability to develop new methods for the collection and analysis of electronic evidence.

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities. This field is under constant evolution as the nature of digital crime continues to change and new methods for tracking and preventing digital attacks are developed.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Digital Evidence  (pages 25-25)
Digital Evidence
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Combating Internet-Based Crime
This content has been removed at the discretion of the publisher and the editors.
Content Protection through the Use of Extrinsic Data
This content has been removed at the discretion of the publisher and the editors.
Application of Pattern Recognition and Signal Processing Techniques to Digital Forensics
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.