Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 119 dokumen yang sesuai dengan query
cover
New York, NY: CRC Press, 2010
614.18 FOR
Buku Teks  Universitas Indonesia Library
cover
cover
Petherick, Wayne A.
"Forensic Criminology is the scientific study of crime and criminals for the purposes of addressing investigative and legal issues. This title provides a bridge between the broad constructs of theoretical criminology and the forensic examination of individual cases. It is suitable for students and professionals in the area of criminology. "
Amsterdam: Elsevier, 2010
363.25 FOR
Buku Teks  Universitas Indonesia Library
cover
Byers, Steven N.
"This unique, step-by-step workbook introduces students to all the procedures of the forensic anthropology protocol while providing even, balanced coverage of the core topics. Each chapter contains detailed explanations of the terminology, osteological features, and measurements needed to understand each of the topics covered."
Boston: Prentice-Hall, 2016
614.17 BYE f
Buku Teks SO  Universitas Indonesia Library
cover
McDermid, Val
"The dead can tell us all about themselves: where they came from, how they lived, how they died, and, of course, who killed them. Forensic scientists can unlock the mysteries of the past and help serve justice using the messages left by a corpse, a crime scene, or the faintest of human traces. This book draws on crime novelist McDermid's own interviews and firsthand experience on scene with top forensic scientists. Along the way, McDermid discovers how maggots collected from a corpse can help determine one's time of death; how a DNA trace a millionth the size of a grain of salt can be used to convict a killer; and how a team of young Argentine scientists led by a maverick American anthropologist were able to uncover the victims of a genocide. It's a journey that will take McDermid to war zones, fire scenes, and autopsy suites, and bring her into contact with both extraordinary bravery and wickedness, as she traces the history of forensics from its earliest beginnings to the cutting-edge science of the modern day"
New York : Grove Press , 2014
363.25 MCD f
Buku Teks  Universitas Indonesia Library
cover
Govindiah, D.
Hyderabad: Jaypee Brothers Medical , 2011
614GOVF001
Multimedia  Universitas Indonesia Library
cover
Govindiah, D.
Hyderabad: Jaypee Brothers Medical , 2011
614GOVF002
Multimedia  Universitas Indonesia Library
cover
Gavin, Helen
"Covering the conceptual basis and practical applications of psychology in forensic and criminal contexts, the second edition of this theoretically rigorous and fun introduction includes updated definitions, an extended research methods chapter and additional content on domestic violence and gender and criminality"
Los Angeles: Sage, 2019
364.019 GAV c
Buku Teks  Universitas Indonesia Library
cover
Taylor, Sandie
"This edition of Forensic Psychology: The Basics continues to provide an essential and accessible overview of a dynamic and fascinating discipline. Providing an engaging introduction to the core topics within Forensic Psychology, the text combines a discussion of theory with information about the role of a professional forensic psychologist.
This edition has been fully updated throughout to include additional coverage of:
Offender profiling and rehabilitation
The role of psychology in crime prevention
Psychological factors relating to terrorism
Established topics including police psychology, the psychology of crime and delinquency, victimology and victim services, and correctional psychology are also considered in this invaluable guide. It will be essential reading for students across a range of disciplines, from psychology to criminology to law, or general readers seeking a concise and jargon-free introduction."
London: Routledge, 2019
614.15 TAY f
Buku Teks SO  Universitas Indonesia Library
cover
Abdul Hakim
"ABSTRAK
Enkripsi dan penyembunyian informasi adalah teknik yang digunakan untuk mendukung kerahasiaan dari informasi. Pada saat ini, banyak aplikasi yang menyediakan layanan enkripsi untuk keamanan informasi pada ponsel seperti kunci galeri, data, dll. Aplikasi ini juga saat ini banyak digunakan oleh pengguna ponsel. Aplikasi ini tidak diragukan lagi akan menjadi tantangan bagi forensik pemeriksa digital ketika ponsel terbukti menggunakan aplikasi kunci. Untuk menghadapi tantangan ini, diperlukan pembuktian ilmiah yang dapat mendapatkan data keamanan sehingga dapat membantu dalam proses analisis. Dalam studi ini, peneliti akan menggunakan alat forensik, XRY dan UFED serta akuisisi manual menggunakan ADB. Hasil yang diperoleh untuk mendapatkan informasi yang dibutuhkan yang terdapat di aplikasi kunci dan mengetahui tool forensik yang dapat diandalkan disesuaikan dengan kondisi yang ada. Pada penelitian ini peneliti berhasil mendapatkan informasi yang dibutuhkan yaitu berupa file image yang dibutuhkan dan informasi penting seperti file XML, basis data, berhasil dikumpulkan sebagai informasi kredensial yang bisa diproses selanjutnya dengan algoritma spesifik tertentu, serta gambaran umum perbedaan penggunaan tool forensik dalam akusisi aplikasi kunci.

ABSTRACT
Encryption is a technique used to support confidentiality from the information. At this time, many applications that provide encryption services for information security on mobile phones like lock gallery, data, etc. These applications are also currently widely used by mobile users. This application will undoubtedly be challenging for digital examiner forensics when the cell phone is evidence using the lock application. To encounter these challenges, this is necessary to prove scientific that can recover encrypted data so that it can assist in the analysis process. In this study, the researcher will use a forensic tool, namely XRY, and manual acquisition using ADB. The results obtained to know go beyond which forensic tools can be relied upon as well as to get the key that the application uses. In this researchers succeeded in getting the information needed in the form of required image files and important information such as XML files, databases, successfully collected as credential information that can be processed further with specific specific algorithms, as well as a general description of differences in the use of forensic tools in the acquisition of vault applications"
2020
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>