Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book demonstrates digital forensics and cyber investigation techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record (MBR) and Guide Partition Table (GBT) as part of the investigative process.
The book demonstrates digital forensics and cyber investigation techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record (MBR) and Guide Partition Table (GBT) as part of the investigative process.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Dr Nour Moustafa is currently Senior Lecturer and leader of Intelligent Security Group at the School of Engineering & Information Technology, University of New South Wales (UNSW Canberra), Australia. He is also Strategic Advisor (AI-SME) at the DXC Technology, Canberra, Australia. He was a Post-doctoral Fellow at UNSW Canberra from June 2017 to December 2018. He received his PhD degree in Computing from UNSW, Australia, in 2017. He obtained his Bachelor and Master degree in Computer Science in 2009 and 2014, respectively, from the Faculty of Computer and Information, Helwan University, Egypt. His areas of interest include Cyber Security, particularly network security, IoT security, intrusion detection systems, statistics, deep learning and machine learning techniques. He has several research grants from industry and defence sponsors, such as Australia's Cyber Security Cooperative Defence Centre, Australian Defence Science and Technology Group, and the Canadian Department of National Defence. He has been awarded the 2020 prestigious Australian Spitfire Memorial Defence Fellowship award. He is also a Senior IEEE Member, ACM Distinguished Speaker, and Spitfire Fellow. He has served his academic community as the guest associate editor of multiple journals, such as IEEE Transactions on Industrial Informatics, IEEE Systems, IEEE IoT Journal, IEEE Access, Ad Hoc Networks, and the Journal of Parallel and Distributed Computing. He has also served over seven leadership conferences, including as vice-chair, session chair, Technical Program Committee (TPC) member and proceedings chair, including for the 2020-2021 IEEE TrustCom and 2020 33rd Australasian Joint Conference on Artificial Intelligence.
Inhaltsangabe
Preface. Dedication and Acknowledgment. Author. Acronyms. 1. An Overview of Digital Forensics. 2. An Introduction to Machine Learning and Deep Learning for Digital Forensics. 3. Digital Forensics and Computer Foundations. 4. Fundamentals of Hard Disk Analysis. 5. Advanced Hard Disk Analysis. 6. File System Analysis (Windows). 7. Digital Forensics Requirements and Tools. 8. File Allocation Table (FAT) File System. 9. NTFS File System. 10. FAT and NTFS Recovery. 11. Basic Linux for Forensics. 12. Advanced Linux Forensics. 13. Network Forensics. 14. Machine Learning Trends for Digital Forensics. Index.
Preface. Dedication and Acknowledgment. Author. Acronyms. 1. An Overview of Digital Forensics. 2. An Introduction to Machine Learning and Deep Learning for Digital Forensics. 3. Digital Forensics and Computer Foundations. 4. Fundamentals of Hard Disk Analysis. 5. Advanced Hard Disk Analysis. 6. File System Analysis (Windows). 7. Digital Forensics Requirements and Tools. 8. File Allocation Table (FAT) File System. 9. NTFS File System. 10. FAT and NTFS Recovery. 11. Basic Linux for Forensics. 12. Advanced Linux Forensics. 13. Network Forensics. 14. Machine Learning Trends for Digital Forensics. Index.
Rezensionen
"Digital forensics is a very important topic. Using Machine Learning for digital forensics will detect cyber-attacks and assist investigators"
-Izhar Ahmed Khan, College of Computer Science & Technology, Nanjing University of Aeronautics and Astronautics, China.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497