 |
|
|
 Computer Evidence: Collection and Preservation
As computers and data systems continue to evolve, they expand into every facet of our personal and business lives. Never before has our society been so information and technology driven. Because computers, data communications, and data storage devices have become ubiquitous, few crimes or civil disputes do not involve them in some way. This... |  |  Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.
Enterprise Mac... |  |  Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |
|
|
 |  |  Advanced Statistical Steganalysis (Information Security and Cryptography)
Steganography and steganalysis, the hiding and detection of a covert payload
within an innocent cover object, started to receive attention from the computer
science, engineering, and mathematics communities in the 1990s. At
first the problems were not clearly defined, but proper statistical foundations
were proposed and mathematical... |  |  Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and
Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli,
Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed
introduction of these four papers, please refer to the Preface written by
the organizers... |
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |