
Advanced Techniques and Applications of Cybersecurity and Forensics
- 324 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Advanced Techniques and Applications of Cybersecurity and Forensics
About this book
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing.
• Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics
• Covers advanced tools in the domain of data hiding and steganalysis
• Discusses the role and application of artificial intelligence and big data in cybersecurity
• Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues
• Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics
The text is primarily written for senior undergraduates, graduate students, and academic
researchers, in the fields of computer science, electrical engineering, cybersecurity,
and forensics.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Half Title page
- Series Page
- Title Page
- Copyright Page
- Dedication
- Contents
- Preface
- About the Editor’s
- Contributors
- 1 Advanced Cybersecurity Tools and Techniques
- 2 Advanced Forensics Open-Source Tools
- 3 Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques
- 4 IoT Forensics
- 5 Big Data Forensics: Challenges and Approaches
- 6 Drone Forensics
- 7 Ransomware Attacks on IoT Devices
- 8 A Critical Analysis of Privacy Implications Surrounding Alexa and Voice Assistants
- 9 Zeus: In-Depth Malware Analysis of Banking Trojan Malware
- 10 Villain: Malware Analysis and Antivirus Evasion of a Backdoor Generator
- 11 An Investigation of Memory Forensics in Kernel Data Structure
- 12 Analysis and Impacts of Avast Antivirus Vulnerabilities
- 13 How to Recover Deleted Data from SSD Drives after TRIM
- 14 Early Validation of Investigation Process Model
- 15 Dark Web Forensics
- Index