Niranjan Reddy
Practical Cyber Forensics (eBook, PDF)
An Incident-Based Approach to Forensic Investigations
35,95 €
35,95 €
inkl. MwSt.
Sofort per Download lieferbar
18 °P sammeln
35,95 €
Als Download kaufen
35,95 €
inkl. MwSt.
Sofort per Download lieferbar
18 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
35,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
18 °P sammeln
Niranjan Reddy
Practical Cyber Forensics (eBook, PDF)
An Incident-Based Approach to Forensic Investigations
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
>Covers Forensics as a Service (FraSS) >Includes Crypto-currency forensic techniques >Features real world cases on Web Attacks and Email Crimes
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 32.02MB
Andere Kunden interessierten sich auch für
Digital Forensics and Cyber Crime (eBook, PDF)38,95 €
Brian CarrierFile System Forensic Analysis (eBook, PDF)38,95 €
Abhijit MohantaMalware Analysis and Detection Engineering (eBook, PDF)67,95 €
Sanjib SinhaBeginning Ethical Hacking with Kali Linux (eBook, PDF)60,95 €
Jie CaoEdge Computing: A Primer (eBook, PDF)56,95 €
Priyanka NandalMalware Detection (eBook, PDF)39,99 €
Jiewen YaoBuilding Secure Firmware (eBook, PDF)43,95 €-
-
-
>Covers Forensics as a Service (FraSS)
>Includes Crypto-currency forensic techniques
>Features real world cases on Web Attacks and Email Crimes
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Apress
- Seitenzahl: 488
- Erscheinungstermin: 16. Juli 2019
- Englisch
- ISBN-13: 9781484244609
- Artikelnr.: 57625835
- Verlag: Apress
- Seitenzahl: 488
- Erscheinungstermin: 16. Juli 2019
- Englisch
- ISBN-13: 9781484244609
- Artikelnr.: 57625835
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Mr Niranjan Reddy is a renowed and passionate Information Security professional who specializes in Cyber Security & Digital Forensics. He has a hands-on experience in almost all domains of Information Security specializing in Cyber Forensics. He is an Electronics Graduate and possess numerous International Certifications under his belt to name a few are MCSE,CCNA,Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), Certified Information System Security Professional(CISSP),Offensive Security Certified Professional(OSCP),ISO-27000:2013-Lead Auditor and many more.He is a Mentor,Enetrpreneur, Founder & CTO of NetConclave Systems which is an IT Security Consulting,Services & Trainings firm headquartered in Pune-India.
He was awarded the Global ECCouncil Excellence Instructor Award for 9 years in a row (2009-2017) in the South Asia category by ECCouncil,USA for corporate trainings and his contributions to the Infosec domain. .His articles on forensics and cyber security have been featured in many international and domestic publications such as Hakin9, E-Forensics,D46 magazine,India Legal, etc.
He has 14+ years plus of rich global experience in field of Information Security, Digital Forensics, Security Audits, Cyber Laws and Incident Response and handled critical runaway projects worldwide. He has been a speaker at various international & domestic conferences such as GroundZero, National Information Security Summit(NISS),ECCouncil International Cyber Security Summit in Colombo,HAKON, Hackers Day,NASSCOMM,Inforsecon at GFSU National Cyber Defence Research Center(NCDRC),ISACA Pune chapter and many more.He has also authored various articles on information security and Digital forensics,Cyber Crime Investigations in many domestic and international print media's like e-forensics,Hakin9, India Legal ,Digital 4N6 magazine Gulf Times, Daily-Financial Times Daily-Colombo,Times Of India,Mid-Day,Sakal Times & many more besides being featured on Radio and Televison channels.
He was awarded the Global ECCouncil Excellence Instructor Award for 9 years in a row (2009-2017) in the South Asia category by ECCouncil,USA for corporate trainings and his contributions to the Infosec domain. .His articles on forensics and cyber security have been featured in many international and domestic publications such as Hakin9, E-Forensics,D46 magazine,India Legal, etc.
He has 14+ years plus of rich global experience in field of Information Security, Digital Forensics, Security Audits, Cyber Laws and Incident Response and handled critical runaway projects worldwide. He has been a speaker at various international & domestic conferences such as GroundZero, National Information Security Summit(NISS),ECCouncil International Cyber Security Summit in Colombo,HAKON, Hackers Day,NASSCOMM,Inforsecon at GFSU National Cyber Defence Research Center(NCDRC),ISACA Pune chapter and many more.He has also authored various articles on information security and Digital forensics,Cyber Crime Investigations in many domestic and international print media's like e-forensics,Hakin9, India Legal ,Digital 4N6 magazine Gulf Times, Daily-Financial Times Daily-Colombo,Times Of India,Mid-Day,Sakal Times & many more besides being featured on Radio and Televison channels.
Chapter 1: Introduction to Cyber Forensics- Chapter 2: Windows Forensics.- Chapter 3: Linux Forensics .- Chapter 4: MAC Forensics.- Chapter 5: Anti Forensics Techniques & Detection.- Chapter 6: Network forensics.- Chapter 7: Mobile forensics.- Chapter 8: Cloud forensics.- Chapter 9: Investigating Malware attacks.- Chapter 10: Investigating web attacks.- Chapter 11: Investigating email crimes.- Chapter 12: SSD Forensics.- Chapter 13: BitCoin Forensics.-Chapter 14:Cyber Laws Overview.-Chapter 15:Investigative Reports and Legal Acceptance.
Chapter 1: Introduction to Cyber Forensics- Chapter 2: Windows Forensics.- Chapter 3: Linux Forensics .- Chapter 4: MAC Forensics.- Chapter 5: Anti Forensics Techniques & Detection.- Chapter 6: Network forensics.- Chapter 7: Mobile forensics.- Chapter 8: Cloud forensics.- Chapter 9: Investigating Malware attacks.- Chapter 10: Investigating web attacks.- Chapter 11: Investigating email crimes.- Chapter 12: SSD Forensics.- Chapter 13: BitCoin Forensics.-Chapter 14:Cyber Laws Overview.-Chapter 15:Investigative Reports and Legal Acceptance.







