Advanced Techniques and Applications of Cybersecurity and Forensics -
- Format: Relié Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre206,99 €
Produit Neuf
Ou 51,75 € /mois
- Livraison à 0,01 €
- Livré entre le 26 mai et le 2 juin
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032479576_dbm
Nos autres offres
-
196,51 €
Produit Neuf
Ou 49,13 € /mois
- Livraison : 3,99 €
- Livré entre le 26 et le 30 mai
-
206,99 €
Produit Neuf
Ou 51,75 € /mois
- Livraison à 0,01 €
- Livré entre le 26 mai et le 2 juin
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032479576_dbm
-
192,34 €
Produit Neuf
Ou 48,09 € /mois
- Livraison : 25,00 €
- Livré entre le 8 et le 13 juin
-
232,63 €
Produit Neuf
Ou 58,16 € /mois
- Livraison à 0,01 €
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
-
259,62 €
Produit Neuf
Ou 64,91 € /mois
- Livraison : 11,19 €
- Livré entre le 26 et le 30 mai
Exp¿di¿ en 7 jours ouvr¿s
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Advanced Techniques And Applications Of Cybersecurity And Forensics de Format Relié - Livre Littérature Générale
0 avis sur Advanced Techniques And Applications Of Cybersecurity And Forensics de Format Relié - Livre Littérature Générale
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Erazer Beast 16 X1 Ultimate (Md 62732) Intel Core Ultra 9 275hx Ordinateur Portable 16" Quad Hd+ 32 Go Ddr5-Sdram 2 To Ssd Nvidia Geforce Rtx 5090 Wi-Fi 6e (802.11ax) Windows 11 Home Noir
Neuf dès 120,22 €
-
Lingua Latina Per Se Illustrata Pars I I
Occasion dès 119,17 €
-
Giorgio Morandi Artista D'europa
Occasion dès 150,00 €
-
The New Encyclopedia Of The American West
Neuf dès 286,99 €
-
Lee Miller: An Exhibition Of Photographs, 1929-1964
Occasion dès 125,00 €
-
Hollywood Jewels: Movies, Jewelry, Stars
Occasion dès 131,99 €
-
Calvin Klein
Neuf dès 121,62 €
-
Manuel D'épigraphie Akkadienne - (Signes, Syllabaire, Idéogrammes)
1 avis
Occasion dès 182,60 €
-
The Philip K. Dick Collection
Neuf dès 109,00 €
-
Designed By Peter Saville
1 avis
Occasion dès 99,00 €
-
Financial Markets And Institutions, Global Edition
Neuf dès 117,78 €
-
Conformal Field Theory
Neuf dès 190,65 €
-
Art Of Sea Of Thieves
1 avis
Neuf dès 127,99 €
-
Triumph Of Vulcan: Sculptors' Tools, Porphyry, And The Prince In Ducal Florence
Occasion dès 220,00 €
-
The Feynman Lectures On Physics. The New Millennium Edition
1 avis
Neuf dès 243,88 €
-
Le Corbusier, 1910-65
Occasion dès 250,99 €
-
Encyclopedie Musicale Michael Jackson
6 avis
Occasion dès 115,00 €
-
Fotografias 1976 - 2003 Photographs 1976 - 2003
Occasion dès 120,00 €
-
How Children Develop
Neuf dès 110,09 €
-
Illuminations-2cd-Prix Conseille 24.20 E/Ttc
Occasion dès 160,00 €
Produits similaires
Présentation Advanced Techniques And Applications Of Cybersecurity And Forensics de Format Relié
- Livre Littérature Générale
Résumé : The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing. ? Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics ? Covers advanced tools in the domain of data hiding and steganalysis ? Discusses the role and application of artificial intelligence and big data in cybersecurity ? Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues ? Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics The text is primarily written for senior undergraduates, graduate students, and academic
researchers, in the fields of computer science, electrical engineering, cybersecurity,
and forensics.
Biographie: Keshav Kaushik is an experienced educator with around ten years of teaching and research experience in cybersecurity, digital forensics, and the Internet of Things. He is working as an Assistant Professor (Selection Grade) in the systems cluster under the School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. He has published 110+ research papers in International Journals and has presented at reputed International Conferences. He is a Certified Ethical Hacker (CEH) v11, CQI and IRCA Certified ISO/IEC 27001:2013 Lead Auditor, Quick Heal Academy Certified Cyber Security Professional (QCSP), and IBM Cybersecurity Analyst. He acted as a keynote speaker and delivered 50+ professional talks on various national and international platforms. He has edited over twenty books with reputed international publishers like Springer, Taylor and Francis, IGI Global, Bentham Science, etc. He has chaired various special sessions at international conferences and also served as a reviewer in peer-reviewed journals and conferences. Currently, he is also serving as a Vice Chairperson of the Meerut ACM Professional Chapter and is also a brand ambassador for Bentham Science. Moreover, he is also serving as a guest editor in the IEEE Journal of Biomedical and Health Informatics (J-BHI) (IF:7.7). Dr. Mariya Ouaissa is currently Professor in Cybersecurity and practitioner with industry and academic experience. She is a Ph.D., graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is Co-Founder and IT Consultant at IT Support and Consulting Center. She was working for the School of Technology of Meknes Morocco as a Visiting Professor from 2013 to 2021. She is a member of the International Association of Engineers and the International Association of Online Engineering, and since 2021, she has been an ACM Professional Member. She is Expert Reviewer with the Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has served and continues to serve on technical programs and organizer committees of several conferences and events and has organized many Symposiums/Workshops/Conferences as a General Chair and is also a reviewer of numerous international journals. Dr. Ouaissa has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained network security. Her main research topics are IoT, M2M, D2D, WSN, Cellular Networks, and Vehicular Networks. She has published over 40 papers (book chapters, international journals, and conferences/workshops), 12 edited books, and 8 special issues as guest editor. Aryan Chaudhary is the Chief Scientific Advisor at BioTech Sphere Research, India. He continues to make groundbreaking contributions to the industry. Having served as the Research Head at Nijji HealthCare Pvt Ltd, he has demonstrated his expertise in leveraging revolutionary technologies such as artificial intelligence, deep learning, IoT, cognitive technology, and blockchain to revolutionize the healthcare landscape. His relentless pursuit of excellence and innovation has earned him recognition as a thought leader in the industry. His dedication to advancing healthcare is evident through his vast body of work. He has authored several influential academic papers on public health and digital health, published in prestigious international journals. His research primarily focuses on integrating IoT and sensor technology for eff...
Sommaire: 1. Advanced Cyber Security Tools and Techniques 2. Advanced Forensics open-source tools 3. Artificial Intelligence and Machine Learning Enabled Cyber Security Tools and Techniques 4. IoT Forensics 5. BIG DATA FORENSICS: CHALLENGES AND APPROACHES 6. Drone Forensics 7. Ransomware Attacks on IoT Devices 8. A CRITICAL ANALYSIS OF PRIVACY IMPLICATIONS SURROUNDING ALEXA AND VOICE ASSISTANTS 9 Zeus: In-Depth Malware Analysis of Banking Trojan Malware 10. Villain: Malware Analysis and Antivirus Evasion of a Backdoor Generator 11. An Investigation of Memory Forensics in kernel Data structure 12. Analysis and Impacts of Avast Antivirus Vulnerabilities 13. How to Recover Deleted Data from SSD Drives after TRIM 14. Early Validation of Investigation Process Model 15. Darkweb Forensics
Détails de conformité du produit
Personne responsable dans l'UE