Advanced Techniques and Applications of Cybersecurity and Forensics (eBook, ePUB)
Redaktion: Kaushik, Keshav; Chaudhary, Aryan; Ouaissa, Mariya
Alle Infos zum eBook verschenken
Advanced Techniques and Applications of Cybersecurity and Forensics (eBook, ePUB)
Redaktion: Kaushik, Keshav; Chaudhary, Aryan; Ouaissa, Mariya
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Hier können Sie sich einloggen

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing.
. Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics
. Covers advanced tools in the domain of data hiding and steganalysis
. Discusses the role and application of artificial intelligence and big data in cybersecurity
. Elaborates on the use of advanced cybersecurity and…mehr
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
Advanced Techniques and Applications of Cybersecurity and Forensics (eBook, PDF)51,95 €
Akashdeep BhardwajMastering Cybersecurity (eBook, ePUB)44,95 €
Akashdeep BhardwajMastering Cybersecurity (eBook, ePUB)44,95 €
Advanced Smart Computing Technologies in Cybersecurity and Forensics (eBook, ePUB)49,95 €
Unleashing the Art of Digital Forensics (eBook, ePUB)54,95 €
Tony ThomasIntelligent Mobile Malware Detection (eBook, ePUB)43,95 €
Lukasz OlejnikPhilosophy of Cybersecurity (eBook, ePUB)44,95 €-
-
-
. Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics
. Covers advanced tools in the domain of data hiding and steganalysis
. Discusses the role and application of artificial intelligence and big data in cybersecurity
. Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues
. Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics
The text is primarily written for senior undergraduates, graduate students, and academic
researchers, in the fields of computer science, electrical engineering, cybersecurity,
and forensics.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 324
- Erscheinungstermin: 22. Juli 2024
- Englisch
- ISBN-13: 9781040038598
- Artikelnr.: 72284367
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 324
- Erscheinungstermin: 22. Juli 2024
- Englisch
- ISBN-13: 9781040038598
- Artikelnr.: 72284367
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
open-source tools 3. Artificial Intelligence and Machine Learning Enabled
Cyber Security Tools and Techniques 4. IoT Forensics 5. BIG DATA FORENSICS:
CHALLENGES AND APPROACHES 6. Drone Forensics 7. Ransomware Attacks on IoT
Devices 8. A CRITICAL ANALYSIS OF PRIVACY IMPLICATIONS SURROUNDING ALEXA
AND VOICE ASSISTANTS 9 Zeus: In-Depth Malware Analysis of Banking Trojan
Malware 10. Villain: Malware Analysis and Antivirus Evasion of a Backdoor
Generator 11. An Investigation of Memory Forensics in kernel Data structure
12. Analysis and Impacts of Avast Antivirus Vulnerabilities 13. How to
Recover Deleted Data from SSD Drives after TRIM 14. Early Validation of
Investigation Process Model 15. Darkweb Forensics
open-source tools 3. Artificial Intelligence and Machine Learning Enabled
Cyber Security Tools and Techniques 4. IoT Forensics 5. BIG DATA FORENSICS:
CHALLENGES AND APPROACHES 6. Drone Forensics 7. Ransomware Attacks on IoT
Devices 8. A CRITICAL ANALYSIS OF PRIVACY IMPLICATIONS SURROUNDING ALEXA
AND VOICE ASSISTANTS 9 Zeus: In-Depth Malware Analysis of Banking Trojan
Malware 10. Villain: Malware Analysis and Antivirus Evasion of a Backdoor
Generator 11. An Investigation of Memory Forensics in kernel Data structure
12. Analysis and Impacts of Avast Antivirus Vulnerabilities 13. How to
Recover Deleted Data from SSD Drives after TRIM 14. Early Validation of
Investigation Process Model 15. Darkweb Forensics







