Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/803
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Iorliam, Aamo. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:15Z | - |
dc.date.available | 2020-05-17T08:22:15Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319944999 ; | en_US |
dc.identifier.isbn | 9783319944982 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/803 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319944982. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benfordees law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular. ; | en_US |
dc.description.statementofresponsibility | by Aamo Iorliam. | en_US |
dc.description.tableofcontents | Chapter 1. Introduction -- Chapter 2. History of Forensic Science -- Chapter 3. Subdivisions of Forensic Science -- Chapter 4. Forensic Tools for Different Subdivisions -- Chapter 5. Forensics and Biometrics Importance -- Chapter 6. Impact of Forensic Science and Bodies that Need Forensic Science in Nigeria. ; | en_US |
dc.format.extent | XX, 94 p. 7 illus., 4 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768. ; | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768. ; | en_US |
dc.relation.haspart | 9783319944982.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Biometrics (Biology). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer crimes. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Cybercrime. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Biometrics. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Fundamental Computing Forensics for Africa | en_US |
dc.title.alternative | A Case Study of the Science in Nigeria / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319944982.pdf | 1.65 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Iorliam, Aamo. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:15Z | - |
dc.date.available | 2020-05-17T08:22:15Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319944999 ; | en_US |
dc.identifier.isbn | 9783319944982 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/803 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319944982. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benfordees law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular. ; | en_US |
dc.description.statementofresponsibility | by Aamo Iorliam. | en_US |
dc.description.tableofcontents | Chapter 1. Introduction -- Chapter 2. History of Forensic Science -- Chapter 3. Subdivisions of Forensic Science -- Chapter 4. Forensic Tools for Different Subdivisions -- Chapter 5. Forensics and Biometrics Importance -- Chapter 6. Impact of Forensic Science and Bodies that Need Forensic Science in Nigeria. ; | en_US |
dc.format.extent | XX, 94 p. 7 illus., 4 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768. ; | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768. ; | en_US |
dc.relation.haspart | 9783319944982.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Biometrics (Biology). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer crimes. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Cybercrime. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Biometrics. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Fundamental Computing Forensics for Africa | en_US |
dc.title.alternative | A Case Study of the Science in Nigeria / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319944982.pdf | 1.65 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Iorliam, Aamo. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:15Z | - |
dc.date.available | 2020-05-17T08:22:15Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319944999 ; | en_US |
dc.identifier.isbn | 9783319944982 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/803 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319944982. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benfordees law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular. ; | en_US |
dc.description.statementofresponsibility | by Aamo Iorliam. | en_US |
dc.description.tableofcontents | Chapter 1. Introduction -- Chapter 2. History of Forensic Science -- Chapter 3. Subdivisions of Forensic Science -- Chapter 4. Forensic Tools for Different Subdivisions -- Chapter 5. Forensics and Biometrics Importance -- Chapter 6. Impact of Forensic Science and Bodies that Need Forensic Science in Nigeria. ; | en_US |
dc.format.extent | XX, 94 p. 7 illus., 4 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768. ; | en_US |
dc.relation.ispartofseries | SpringerBriefs in Computer Science, ; 2191-5768. ; | en_US |
dc.relation.haspart | 9783319944982.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Biometrics (Biology). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer crimes. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Cybercrime. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Biometrics. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Fundamental Computing Forensics for Africa | en_US |
dc.title.alternative | A Case Study of the Science in Nigeria / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319944982.pdf | 1.65 MB | Adobe PDF | Preview File |