The first comprehensive and detailed presentation of techniques for authenticating digital images. Photographs have been doctored since photography was invented. Dictators have erased people from photographs and from history. Politicians have manipulated photos for short-term political gain. Altering photographs in the predigital era required time-consuming darkroom work. Today, powerful and lo…
The evidential role of matter--when media records trace evidence of violence--explored through a series of cases drawn from Kosovo, Japan, Vietnam, and elsewhere. In this book, Susan Schuppli introduces a new operative concept: material witness, an exploration of the evidential role of matter as both registering external events and exposing the practices and procedures that enable matter to bea…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
In the United States, the exercise of police authority—and the public’s trust that police authority is used properly—is a recurring concern. Contemporary prescriptions for police reform hold that the public would trust the police more and feel a greater obligation to comply and cooperate if police-citizen interactions were marked by higher levels of procedural justice by police. In this b…
This brief highlights advances in DNA technologies and their wider applications. DNA is the source of life and has been studied since a generation, but very little is known as yet. Several sophisticated technologies of the current era have laid their foundations on the principle of DNA based mechanisms. DNA based technologies are bringing a new revolution of Advanced Science and Technology. For…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
This volume provides an overview of (1) the physical and chemical foundations of dating methods and (2) the applications of dating methods in the geological sciences, biology, and archaeology, in almost 200 articles from over 200 international authors. It will serve as the most comprehensive treatise on widely accepted dating methods in the earth sciences and related fields. No other volume has…
Dr. Iosif I. Androulidakis has an active presence in the ICT security field having authored more than 90 publications (including 6 books) and having presented more than 120 talks and lectures in international conferences and seminars in 20 countries. Holding 2 Ph.Ds his research interests focus on security issues in PBXs (private telephony exchanges), where he has 20 years of experience, as…