The Leading eBooks Store Online 4,272,009 members ⚫ 1,419,367 ebooks

New to

Learn more

Privacy Protection and Computer Forensics

Privacy Protection and Computer Forensics by Michael Caloyannides
Buy this eBook
US$ 94.00
(If any tax is payable it will be calculated and shown at checkout.)
This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell’s equations. There has been considerable advancement in FDTD computational technology over the past few years, and this new edition brings you the very latest details with four new invited chapters on advanced techniques for PSTD, unconditional stability, provably stable FDTD-FETD hybrids, and hardware acceleration. Moreover, you find many completely new sections throughout the book, including major updates on convolutional PML ABCs; dispersive, nonlinear, classical-gain, and quantum-gain materials; and micro-, nano-, and bio- photonics.

This unique resource provides a method for ensuring that computers that are connected to the Internet are protected from malicious mobile code (code that can allow a remote hacker to read, remove, damage, or even add data to one’s computer) the new fashion of "adware/spyware", and “Web bugs.” Moreover, you learn how to detect whether advanced investigative tools, such as keystroke storing and relaying hardware and software, are in use in a computer; you also learn of commercially available capabilities for intercepting radio signals unintentionally radiated by a computer. Other critical topics include the pitfalls of encryption and how to use it effectively, the practical aspects of online anonymity, and the current legal issues that pertain to the use of computers.



Part 1: The Hype of Computer Forensics - What Is Computer Forensics and Why Is It of Vital Interest to You? Incriminating Data Can Enter One’s Computer Without One’s Complicity or Knowledge. Defending from False Accusations Based on Data Found in One’s Computer. Exactly Where Is Potentially Incriminating Data Stored in One’s Computer and How Did It Get There. Specialized Forensics Techniques. How Can Evidence or Data Be Taken from One’s Computer? Fallacies about Protecting One’s Confidential Data from Hostile Forensics or Other Means of Theft.

Part 2: Computer Privacy And Security - Protecting Proprietary Information from Unauthorized Snooping and From Hostile Computer Forensics. Practical Means of Protecting Proprietary and Other Confidential Information in Computers. Basic, Intermediate and Advanced Online Protection from Computer Forensics and from Privacy Compromises. A Refresher on the Relevant Technical Aspects of the Underlying Technologies. Practical Encryption to Protect Proprietary Information from Hostile Forensics.

Part 3: Evolving Technologies and Legal Issues - Regarding Data and Threats to Privacy from the Use of Photocopiers, Fax Machines, Digital Cameras, Cellphones, MP3 Players, and Other Consumer Electronics. Security Threats from the Use of Wi-FI Wireless Devices. Bluetooth Security. VPNs. Legal Issues and Legal Defense.

About the Author.


Michael A. Caloyannides is a senior fellow at Mitretek Systems in McLean, VA. He received his Ph.D. in electrical engineering, applied mathematics and philosophy from California Institute of Technology. He is an adjunct professor at two renown universities and a regular columnist and associate editor for IEEE Computer Society’s “Security and Privacy” magazine

Artech House; September 2004
366 pages; ISBN 9781580538312
Read online, or download in secure PDF format
Title: Privacy Protection and Computer Forensics
Author: Michael Caloyannides