Personnaliser

OK

Mondial 2026 : 50? offerts* dès 499? d'achat sur les télévisions, vidéoprojecteurs et barres de son avec le code : TV50

En profiter

Advanced Techniques and Applications of Cybersecurity and Forensics -

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre
Filtrer par :
Neuf (5)
Occasion
Reconditionné

206,99 €

Produit Neuf

  • Ou 51,75 € /mois

    • Livraison à 0,01 €
    • Livré entre le 26 mai et le 2 juin
    Voir les modes de livraison

    RiaChristie

    PRO Vendeur favori

    4,9/5 sur + de 1 000 ventes

    Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032479576_dbm

    Nos autres offres

    • 196,51 €

      Produit Neuf

      Ou 49,13 € /mois

      • Livraison : 3,99 €
      • Livré entre le 26 et le 30 mai
      Voir les modes de livraison
      4,8/5 sur + de 1 000 ventes
    • 206,99 €

      Produit Neuf

      Ou 51,75 € /mois

      • Livraison à 0,01 €
      • Livré entre le 26 mai et le 2 juin
      Voir les modes de livraison

      Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032479576_dbm

    • 192,34 €

      Produit Neuf

      Ou 48,09 € /mois

      • Livraison : 25,00 €
      • Livré entre le 8 et le 13 juin
      Voir les modes de livraison
      4,8/5 sur + de 1 000 ventes

      Apres acceptation de la commande, le delai moyen d'expedition depuis le Japon est de 48 heures. Le delai moyen de livraison est de 3 a 4 semaines. En cas de circonstances exceptionnelles, les delais peuvent s'etendre jusqu'à 2 mois.

    • 232,63 €

      Produit Neuf

      Ou 58,16 € /mois

      • Livraison à 0,01 €
      Voir les modes de livraison
      4,8/5 sur + de 1 000 ventes

      Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.

    • 259,62 €

      Produit Neuf

      Ou 64,91 € /mois

      • Livraison : 11,19 €
      • Livré entre le 26 et le 30 mai
      Voir les modes de livraison

      Exp¿di¿ en 7 jours ouvr¿s

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Advanced Techniques And Applications Of Cybersecurity And Forensics de Format Relié  - Livre Littérature Générale

        Note : 0 0 avis sur Advanced Techniques And Applications Of Cybersecurity And Forensics de Format Relié  - Livre Littérature Générale

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Advanced Techniques And Applications Of Cybersecurity And Forensics de Format Relié

         - Livre Littérature Générale

        Livre Littérature Générale - 01/07/2024 - Relié - Langue : Anglais

        . .

      • Editeur : Taylor & Francis Ltd (Sales)
      • Langue : Anglais
      • Parution : 01/07/2024
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 310.0
      • Expédition : 760
      • Dimensions : 23.4 x 15.6 x 1.9
      • ISBN : 1032479574



      • Résumé :

        The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing.

        ? Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics

        ? Covers advanced tools in the domain of data hiding and steganalysis

        ? Discusses the role and application of artificial intelligence and big data in cybersecurity

        ? Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues

        ? Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics

        The text is primarily written for senior undergraduates, graduate students, and academic
        researchers, in the fields of computer science, electrical engineering, cybersecurity,
        and forensics.

        ...

        Biographie:

        Keshav Kaushik is an experienced educator with around ten years of teaching and research experience in cybersecurity, digital forensics, and the Internet of Things. He is working as an Assistant Professor (Selection Grade) in the systems cluster under the School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. He has published 110+ research papers in International Journals and has presented at reputed International Conferences. He is a Certified Ethical Hacker (CEH) v11, CQI and IRCA Certified ISO/IEC 27001:2013 Lead Auditor, Quick Heal Academy Certified Cyber Security Professional (QCSP), and IBM Cybersecurity Analyst. He acted as a keynote speaker and delivered 50+ professional talks on various national and international platforms. He has edited over twenty books with reputed international publishers like Springer, Taylor and Francis, IGI Global, Bentham Science, etc. He has chaired various special sessions at international conferences and also served as a reviewer in peer-reviewed journals and conferences. Currently, he is also serving as a Vice Chairperson of the Meerut ACM Professional Chapter and is also a brand ambassador for Bentham Science. Moreover, he is also serving as a guest editor in the IEEE Journal of Biomedical and Health Informatics (J-BHI) (IF:7.7).

        Dr. Mariya Ouaissa is currently Professor in Cybersecurity and practitioner with industry and academic experience. She is a Ph.D., graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is Co-Founder and IT Consultant at IT Support and Consulting Center. She was working for the School of Technology of Meknes Morocco as a Visiting Professor from 2013 to 2021. She is a member of the International Association of Engineers and the International Association of Online Engineering, and since 2021, she has been an ACM Professional Member. She is Expert Reviewer with the Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has served and continues to serve on technical programs and organizer committees of several conferences and events and has organized many Symposiums/Workshops/Conferences as a General Chair and is also a reviewer of numerous international journals. Dr. Ouaissa has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained network security. Her main research topics are IoT, M2M, D2D, WSN, Cellular Networks, and Vehicular Networks. She has published over 40 papers (book chapters, international journals, and conferences/workshops), 12 edited books, and 8 special issues as guest editor.

        Aryan Chaudhary is the Chief Scientific Advisor at BioTech Sphere Research, India. He continues to make groundbreaking contributions to the industry. Having served as the Research Head at Nijji HealthCare Pvt Ltd, he has demonstrated his expertise in leveraging revolutionary technologies such as artificial intelligence, deep learning, IoT, cognitive technology, and blockchain to revolutionize the healthcare landscape. His relentless pursuit of excellence and innovation has earned him recognition as a thought leader in the industry. His dedication to advancing healthcare is evident through his vast body of work. He has authored several influential academic papers on public health and digital health, published in prestigious international journals. His research primarily focuses on integrating IoT and sensor technology for eff...

        Sommaire:

        1. Advanced Cyber Security Tools and Techniques 2. Advanced Forensics open-source tools 3. Artificial Intelligence and Machine Learning Enabled Cyber Security Tools and Techniques 4. IoT Forensics 5. BIG DATA FORENSICS: CHALLENGES AND APPROACHES 6. Drone Forensics 7. Ransomware Attacks on IoT Devices 8. A CRITICAL ANALYSIS OF PRIVACY IMPLICATIONS SURROUNDING ALEXA AND VOICE ASSISTANTS 9 Zeus: In-Depth Malware Analysis of Banking Trojan Malware 10. Villain: Malware Analysis and Antivirus Evasion of a Backdoor Generator 11. An Investigation of Memory Forensics in kernel Data structure 12. Analysis and Impacts of Avast Antivirus Vulnerabilities 13. How to Recover Deleted Data from SSD Drives after TRIM 14. Early Validation of Investigation Process Model 15. Darkweb Forensics

        ...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com