Handbook Of Research On Computational Forensics, Digital Crime, And Investigation

Hardcover (Print)
Buy New
Buy New from BN.com
Used and New from Other Sellers
Used and New from Other Sellers
from $49.12
Usually ships in 1-2 business days
(Save 83%)
Other sellers (Hardcover)
  • All (8) from $49.12   
  • New (6) from $125.00   
  • Used (2) from $49.12   


Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation. The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary readership ranging from academic and professional research communities to industry consultants and practitioners.

Read More Show Less

Product Details

  • ISBN-13: 9781605668369
  • Publisher: IGI Global
  • Publication date: 2/23/2011
  • Pages: 620
  • Product dimensions: 8.50 (w) x 11.00 (h) x 1.31 (d)

Table of Contents

Ch. 1 Privacy Enhancing Technologies in Biometrics 1

Ch. 2 A Fingerprint Forensic Tool for Criminal Investigations 23

Ch. 3 Principles and Methods for Face Recognition and Face Modelling 53

Ch. 4 Biometrical Processing of Faces in Security and Forensics 79

Ch. 5 Digital Camera Photographic Provenance 104

Ch. 6 Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication 130

Ch. 7 Challenges and Solutions in Multimedia Document Authentication 155

Ch. 8 Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications 176

Ch. 9 A Novel Multilevel DCT Based Reversible Data Hiding 204

Ch. 10 Massively Threaded Digital Forensics Tools 234

Ch. 11 Testing Digital Forensic Software Tools Used in Expert Testimony 257

Ch. 12 Network Forensics: A Practical Introduction 279

Ch. 13 A Novel Intrusion Detection System for Smart Space 307

Ch. 14 Deception Detection on the Internet 334

Ch. 15 Forensic Investigation of Peer-to-Peer Networks 355

Ch. 16 Identity Theft through the Web 379

Ch. 17 Embedded Forensics: An Ongoing Research about SIM/USIM Cards 396

Ch. 18 Forensic Implications of Virtualization Technologies 424

Ch. 19 Conceptual Tools for Dealing with Narrative Terrorism Information 447

Ch. 20 Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process 470

Ch. 21 Legal Issues for Research and Practice in Computational Forensics 496

Ch. 22 Trends in Information Security Regulation 516

Compilation of References 529

Index 579

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)