Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/803
Title: Fundamental Computing Forensics for Africa
Other Titles: A Case Study of the Science in Nigeria /
Authors: Iorliam, Aamo. ;
subject: Computer Science;Computer Communication Systems;Computer Security;Data encryption (Computer science). ;;Biometrics (Biology). ;;Computers;Law and legislation. ;;Computer crimes. ;;Computer Science;Data Encryption. ;;Systems and Data Security;Cybercrime. ;;Computer Communication Networks;Biometrics. ;;Legal Aspects of Computing. ;;005.82 ; 23 ;
Year: 2018
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: SpringerBriefs in Computer Science, ; 2191-5768. ;
SpringerBriefs in Computer Science, ; 2191-5768. ;
Abstract: This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benfordees law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular. ;
Description: QA76.9.A25 ;

SpringerLink (Online service) ;

Printed edition: ; 9783319944982. ;

URI: http://localhost/handle/Hannan/803
ISBN: 9783319944999 ;
9783319944982 (print) ;
More Information: XX, 94 p. 7 illus., 4 illus. in color. ; online resource. ;
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319944982.pdf1.65 MBAdobe PDFThumbnail
Preview File
Title: Fundamental Computing Forensics for Africa
Other Titles: A Case Study of the Science in Nigeria /
Authors: Iorliam, Aamo. ;
subject: Computer Science;Computer Communication Systems;Computer Security;Data encryption (Computer science). ;;Biometrics (Biology). ;;Computers;Law and legislation. ;;Computer crimes. ;;Computer Science;Data Encryption. ;;Systems and Data Security;Cybercrime. ;;Computer Communication Networks;Biometrics. ;;Legal Aspects of Computing. ;;005.82 ; 23 ;
Year: 2018
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: SpringerBriefs in Computer Science, ; 2191-5768. ;
SpringerBriefs in Computer Science, ; 2191-5768. ;
Abstract: This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benfordees law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular. ;
Description: QA76.9.A25 ;

SpringerLink (Online service) ;

Printed edition: ; 9783319944982. ;

URI: http://localhost/handle/Hannan/803
ISBN: 9783319944999 ;
9783319944982 (print) ;
More Information: XX, 94 p. 7 illus., 4 illus. in color. ; online resource. ;
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319944982.pdf1.65 MBAdobe PDFThumbnail
Preview File
Title: Fundamental Computing Forensics for Africa
Other Titles: A Case Study of the Science in Nigeria /
Authors: Iorliam, Aamo. ;
subject: Computer Science;Computer Communication Systems;Computer Security;Data encryption (Computer science). ;;Biometrics (Biology). ;;Computers;Law and legislation. ;;Computer crimes. ;;Computer Science;Data Encryption. ;;Systems and Data Security;Cybercrime. ;;Computer Communication Networks;Biometrics. ;;Legal Aspects of Computing. ;;005.82 ; 23 ;
Year: 2018
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: SpringerBriefs in Computer Science, ; 2191-5768. ;
SpringerBriefs in Computer Science, ; 2191-5768. ;
Abstract: This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benfordees law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular. ;
Description: QA76.9.A25 ;

SpringerLink (Online service) ;

Printed edition: ; 9783319944982. ;

URI: http://localhost/handle/Hannan/803
ISBN: 9783319944999 ;
9783319944982 (print) ;
More Information: XX, 94 p. 7 illus., 4 illus. in color. ; online resource. ;
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319944982.pdf1.65 MBAdobe PDFThumbnail
Preview File