
Cyber Security and Digital Forensics
- English
- PDF
- Available on iOS & Android
Cyber Security and Digital Forensics
About this book
CYBER SECURITY AND DIGITAL FORENSICS
Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.
Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats.
This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library.
Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectors
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half-Title Page
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Acknowledgment
- 1 A Comprehensive Study of Security Issues and Research Challenges in Different Layers of ServiceOriented IoT Architecture
- 2 Quantum and Post-Quantum Cryptography
- 3 Artificial Neural Network Applications in Analysis of Forensic Science
- 4 A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications
- 5 Understanding Robotics through Synthetic Psychology
- 6 An Insight into Digital Forensics: History, Frameworks, Types and Tools
- 7 Digital Forensics as a Service: Analysis for Forensic Knowledge
- 8 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework
- 9 Ensuring Secure Data Sharing in IoT Domains Using Blockchain
- 10 A Review of Face Analysis Techniques for Conventional and Forensic Applications
- 11 Roadmap of Digital Forensics Investigation Process with Discovery of Tools
- 12 Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach
- 13 Applications of Machine Learning Techniques in the Realm of Cybersecurity
- 14 Security Improvement Technique for Distributed Control System (DCS) and Supervisory Control-Data Acquisition (SCADA) Using Bl
- 15 Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications
- 16 Ransomware: Threats, Identification and Prevention
- Index
- Also of Interest
- EULA