|
|
|
|
LEADER |
03212nam a2200589 4500 |
001 |
978-3-319-94499-9 |
003 |
DE-He213 |
005 |
20191028141245.0 |
007 |
cr nn 008mamaa |
008 |
180628s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319944999
|9 978-3-319-94499-9
|
024 |
7 |
|
|a 10.1007/978-3-319-94499-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
|
|a Iorliam, Aamo.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Fundamental Computing Forensics for Africa
|h [electronic resource] :
|b A Case Study of the Science in Nigeria /
|c by Aamo Iorliam.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XX, 94 p. 7 illus., 4 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5768
|
505 |
0 |
|
|a Chapter 1. Introduction -- Chapter 2. History of Forensic Science -- Chapter 3. Subdivisions of Forensic Science -- Chapter 4. Forensic Tools for Different Subdivisions -- Chapter 5. Forensics and Biometrics Importance -- Chapter 6. Impact of Forensic Science and Bodies that Need Forensic Science in Nigeria.
|
520 |
|
|
|a This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
1 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cybercrime.
|0 http://scigraph.springernature.com/things/product-market-codes/1B7000
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Biometrics.
|0 http://scigraph.springernature.com/things/product-market-codes/I22040
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I24059
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319944982
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319945002
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5768
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-94499-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|