Research Output
Advanced security and network forensics: Introduction.
  1.1 Objectives
1.2 Introduction
1.3 Security Taxonomy
1.4 Threats
Hardware misuse
Environmental risks
External misuse
Pests
Active misuse
Passive misuse
Masquerading/spoofing
Bypasses
1.5 Service-oriented infrastructures
1.6 Security policies
1.7 Defining the policy
1.8 Tutorial

  • Type:

    Teaching Resource

  • Date:

    25 January 2011

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University

Authors

Keywords

security; digital forensics; web-based systems; secure architectures framework; Cloud; mobile forensics; covert channel analysis; data hiding;

Monthly Views:

Available Documents