Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Secure Reads: Multimedia Fingerprinting Forensics for Traitor Tracing

Read a quick review of Multimedia Fingerprinting Forensics for Traitor Tracing.

This article can also be found in the Premium Editorial Download: Information Security magazine: What's your biggest information security concern?

Here are three security titles for your bookshelf. This month, we highlight forensics:

Multimedia Fingerprinting Forensics for Traitor Tracing
By K.J. Ray Liu, Wade Trappe, Z. Jane Wang, Min Wu, Hong Zhao
Hindawi Publishing Corp., 255 pages, $119.95

The authors, whose specialties lie in electrical engineering, DRM and computer science, include discussions on digital watermarking and fingerprinting, the analysis of multiuser collusion attacks, and the performance and design of fingerprints.

File System Forensic Analysis
By Brian Carrier
Addison-Wesley Pearson Education, 569 pages, $69.99

The author shares his experience writing forensics tools with the literary world, discussing topics such as preserving the digital crime scene, identifying hidden data, analyzing partitions, and collecting the evidence needed to convict digital criminals.

A Guide to Forensic Testimony
By Fred Chris Smith, Rebecca Gurley Bace
Addison-Wesley Pearson Education, 509 pages, $54.99

Though published in 2003, this bookshelf mainstay offers firsthand accounts from technical witnesses, courtroom stories and advice that all security professionals need to know. Topics include the legal criteria needed to be an expert witness, examples of cases, advice on working with an attorney, visual tools and how to use them, and coaching on non-verbal ways to improve testimony.

Visit SearchSecurity.com's Information Security Bookshelf for chapter downloads and podcast readings from popular security books.

This was last published in December 2006

Dig Deeper on Information security laws, investigations and ethics

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.