ISBN13: | 9781032479576 |
ISBN10: | 1032479574 |
Binding: | Hardback |
No. of pages: | 316 pages |
Size: | 234x156 mm |
Language: | English |
Illustrations: | 159 Illustrations, black & white; 6 Halftones, black & white; 153 Line drawings, black & white; 12 Tables, black & white |
700 |
The basics of mathematics and mathematical logic
Electrical engineering and telecommunications, precision engineering
Software development
Artificial Intelligence
Privacy, data security
Computer crime
Safety and health aspects of computing
Computing's and information technology's impact on society
Environmental sciences
Further readings in the field of computing
Criminology
The basics of mathematics and mathematical logic (charity campaign)
Electrical engineering and telecommunications, precision engineering (charity campaign)
Software development (charity campaign)
Artificial Intelligence (charity campaign)
Privacy, data security (charity campaign)
Computer crime (charity campaign)
Safety and health aspects of computing (charity campaign)
Computing's and information technology's impact on society (charity campaign)
Environmental sciences (charity campaign)
Further readings in the field of computing (charity campaign)
Criminology (charity campaign)
Advanced Techniques and Applications of Cybersecurity and Forensics
GBP 120.00
Click here to subscribe.
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues.
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing.
? Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics
? Covers advanced tools in the domain of data hiding and steganalysis
? Discusses the role and application of artificial intelligence and big data in cybersecurity
? Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues
? Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics
The text is primarily written for senior undergraduates, graduate students, and academic researchers, in the fields of computer science, electrical engineering, cybersecurity, and forensics.
1. Advanced Cyber Security Tools and Techniques 2. Advanced Forensics open-source tools 3. Artificial Intelligence and Machine Learning Enabled Cyber Security Tools and Techniques 4. IoT Forensics 5. BIG DATA FORENSICS: CHALLENGES AND APPROACHES 6. Drone Forensics 7. Ransomware Attacks on IoT Devices 8. A CRITICAL ANALYSIS OF PRIVACY IMPLICATIONS SURROUNDING ALEXA AND VOICE ASSISTANTS 9 Zeus: In-Depth Malware Analysis of Banking Trojan Malware 10. Villain: Malware Analysis and Antivirus Evasion of a Backdoor Generator 11. An Investigation of Memory Forensics in kernel Data structure 12. Analysis and Impacts of Avast Antivirus Vulnerabilities 13. How to Recover Deleted Data from SSD Drives after TRIM 14. Early Validation of Investigation Process Model 15. Darkweb Forensics