Digital Forensics and Cyber Crime -
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre182,99 €
Occasion · Comme Neuf
Ou 45,75 € /mois
- Livraison : 25,00 €
- Livré entre le 11 et le 21 mai
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Digital Forensics And Cyber Crime Format Broché - Livre Informatique
0 avis sur Digital Forensics And Cyber Crime Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Conformal Field Theory
Neuf dès 190,65 €
Occasion dès 130,39 €
-
Cogs, Caravels And Galleons
Occasion dès 154,38 €
-
Fotografias 1976 - 2003 Photographs 1976 - 2003
Occasion dès 120,00 €
-
Guerre Et Paix - Tomes 1 Et 2
6 avis
Occasion dès 116,90 €
-
Hollywood Jewels: Movies, Jewelry, Stars
Occasion dès 106,99 €
-
Triumph Of Vulcan: Sculptors' Tools, Porphyry, And The Prince In Ducal Florence
Occasion dès 220,00 €
-
The Feynman Lectures On Physics. The New Millennium Edition
1 avis
Neuf dès 241,85 €
-
Cosaan =: Les Origines (La Civilisation Sereer) (French Edition)
Occasion dès 226,58 €
-
Illuminations-2cd-Prix Conseille 24.20 E/Ttc
Occasion dès 160,00 €
-
Professional Goldsmithing : A Contemporary Guide To Traditional Jewelry Techniques
Occasion dès 110,38 €
-
La Bâtarde
Occasion dès 120,99 €
-
Play Piano With Diana Krall
Occasion dès 217,99 €
-
A Glastonbury Romance
Occasion dès 111,99 €
-
Hilgard S Introduction To Psychology Rita L. Atkinson
Occasion dès 95,99 €
-
Orthodontic Treatment Of Impacted Teeth
Neuf dès 228,30 €
-
The Princeton Companion To Applied Mathematics
Neuf dès 132,30 €
Occasion dès 139,99 €
-
Enseignement Oral De Platon: Une Nouvelle Interprétation Du Platonisme (French Edition)
1 avis
Occasion dès 149,99 €
-
Maison Martin Margiela : Street Special Edition Volumes 1 & 2
Occasion dès 190,00 €
-
Stone Age - Ancient Castles Of Europe
1 avis
Occasion dès 102,40 €
-
A Practical Guide To Chemical Peels, Microdermabrasion & Topical Products
1 avis
Neuf dès 158,90 €
Produits similaires
Présentation Digital Forensics And Cyber Crime Format Broché
- Livre Informatique
Résumé :
Image Forensics.- Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification.- Towards efficient on-site CSAM triage by clustering images from a source point of view.- Can Image Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method.- Forensics Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact Detection on Android Devices using Advanced Machine Learning Techniques.- SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection Model Based on the Improved UNet.- On the application of active learning to handle data evolution in Android malware detection.- Volatility Custom Profiling for Automated Hybrid ELF Malware Detection.- Security Risk Management.- The Need for Biometric Anti-Spoofing Policies: The Case of Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks in Software-Defined Networks.- Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.- Poisoning-Attack Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data Privacy efforts - On the Balance between Data Privacy and Security.- Automating the Flow of Data Between Digital Forensic Tools using Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes....
Sommaire:
Image Forensics.- Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification.- Towards efficient on-site CSAM triage by clustering images from a source point of view.- Can Image Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method.- Forensics Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact Detection on Android Devices using Advanced Machine Learning Techniques.- SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection Model Based on the Improved UNet.- On the application of active learning to handle data evolution in Android malware detection.- Volatility Custom Profiling for Automated Hybrid ELF Malware Detection.- Security Risk Management.- The Need for Biometric Anti-Spoofing Policies: The Case of Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks in Software-Defined Networks.- Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.- Poisoning-Attack Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data Privacy efforts - On the Balance between Data Privacy and Security.- Automating the Flow of Data Between Digital Forensic Tools using Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.
Détails de conformité du produit
Personne responsable dans l'UE