Unleashing the Art of Digital Forensics (eBook, PDF)
Redaktion: Kaushik, Keshav; Wu, Yulei; Kumar Bhatia, Komal; Dahiya, Susheela; Tanwar, Rohit
57,95 €
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
57,95 €
Als Download kaufen
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
29 °P sammeln
Unleashing the Art of Digital Forensics (eBook, PDF)
Redaktion: Kaushik, Keshav; Wu, Yulei; Kumar Bhatia, Komal; Dahiya, Susheela; Tanwar, Rohit
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book is intended to make the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. It is aimed primarily at graduates, postgraduates and researchers in digital forensics and cybersecurity.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 37.02MB
Andere Kunden interessierten sich auch für
- Unleashing the Art of Digital Forensics (eBook, ePUB)57,95 €
- Cyber Security Threats and Challenges Facing Human Life (eBook, PDF)52,95 €
- Security Analytics (eBook, PDF)47,95 €
- Bishwajeet PandeyIntroduction to the Cyber Ranges (eBook, PDF)47,95 €
- Advanced Techniques and Applications of Cybersecurity and Forensics (eBook, PDF)52,95 €
- Hybrid Threats, Cyberterrorism and Cyberwarfare (eBook, PDF)50,95 €
- Paul A. WattersCybercrime and Cybersecurity (eBook, PDF)47,95 €
-
-
-
This book is intended to make the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. It is aimed primarily at graduates, postgraduates and researchers in digital forensics and cybersecurity.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 238
- Erscheinungstermin: 11. August 2022
- Englisch
- ISBN-13: 9781000631890
- Artikelnr.: 64249770
- Verlag: Taylor & Francis
- Seitenzahl: 238
- Erscheinungstermin: 11. August 2022
- Englisch
- ISBN-13: 9781000631890
- Artikelnr.: 64249770
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Mr. Keshav Kaushik is an Assistant Professor in the Department of Systemics, School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. He is pursuing a Ph.D. in Cybersecurity and Forensics. He is an experienced educator with over six years of teaching and research experience in Cybersecurity, Digital Forensics, the Internet of Things, and Blockchain Technology. Mr. Kaushik received his B. Tech degree in Computer Science and Engineering from the University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak. In addition, M. Tech degree in Information Technology from YMCA University of Science and Technology, Faridabad, Haryana. He has qualified GATE (2012 & 2016). He has published several research papers in International Journals and has presented at reputed International Conferences. He is a Certified Ethical Hacker (CEH) v11, CQI and IRCA Certified ISO/IEC 27001:2013 Lead Auditor, and Quick Heal Academy certified Cyber Security Professional (QCSP). He delivered professional talks at national and international platforms being a keynote speaker. Dr. Rohit Tanwar received his bachelor's degree (B. Tech) in CSE from Kurukshetra University, Kurukshetra, India, and master's degree (M. Tech) in CSE from YMCA University of Science and Technology, Faridabad, India. Dr. Tanwar was awarded his Ph.D. degree in 2019 from Kurukshetra University. He has more than 10 years of experience in teaching. Currently, he is working as an Assistant Professor Senior Scale in School of Computer Science, UPES Dehradun. His areas of interest include Network Security, Optimization Techniques, Human computing, Soft computing, Cloud computing, Data Mining, etc. He has more than twenty publications to his credit in different reputed journals and conferences. He has been associated with many conferences throughout India as TPC member and session chair, etc. Dr. Tanwar is an editor of two books that are under processing with CRC Press and Scrivener Publishing (Wiley). He is a special issue editor in the journal EAI Endorsed on Transactions on Pervasive Health and Technology (Scopus Indexed). He is associated with the International Journal of Communication Systems (SCIE) (WILEY), and International Journal of Information Security and Privacy (IJISP) (Scopus, ESCI), IGI Global as an active reviewer. He is supervising two Ph.D. research scholars in the fields of security and optimization. Dr. Susheela Dahiya, Ph.D. (IIT Roorkee) is working as Assistant Professor at the University of Petroleum and Energy Studies (UPES), Dehradun. She received her M. Tech. (Computer Science & Engineering) and Ph.D. degree from IIT Roorkee. She had also qualified NET and GATE. She has more than eight years of academic/research experience. Her research work is focused on satellite image processing, video processing, cyber security, and cloud computing and deep learning. She is also supervising her Ph.D. students in these areas. She has published several research papers in SCI and Scopus indexed journals and conferences. Dr. Komal Kumar Bhatia is working as a Professor at Department of Computer Engineering at J. C. Bose University of Science and Technology has a work experience of 19 years. He received his B.E., M.Tech. and Ph.D. degrees in Computer Engineering in 2001, 2004, and 2009, respectively. He has guided seven Ph.D. scholars and is currently guiding five Ph.D. scholars. He has also guided more than sixty M.Tech. Dissertations. He has published more than a hundred research papers in reputed journals and conferences and his areas of interest are Information Retrieval Systems, Hidden Web, and Web Mining. Currently, he is also working as Dean, Faculty of Informatics & Computing and Chairman of the Department of Computer Engineering. He is also a member of several professional bodies at national/international level. Dr. Yulei Wu is a Senior Lecturer with the Department of Computer Science, College of Engineering, Mathematics and Physical Sciences, University of Exeter, United Kingdom. He received the B.Sc. degree (First Class Honors) in computer Science and the Ph.D. degree in Computing and Mathematics from the University of Bradford, United Kingdom, in 2006 and 2010, respectively. His expertise is on intelligent networking, and his main research interests include computer networks, networked systems, software-defined networks and systems, network management, and network security and privacy. He has authored one book (Springer) and edited/co-edited three books (two with CRC Press and one with The IET). His research has been supported by the Engineering and Physical Sciences Research Council, National Natural Science Foundation of China, University's Innovation Platform and industry. He is an Editor of IEEE Transactions on Network and Service Management, IEEE Transactions on Network Science and Engineering, Computer Networks (Elsevier), and IEEE Access. He is a Senior Member of the IEEE, and a Fellow of the HEA (Higher Education Academy).
1. Data Hiding-Steganography and Steganalysis
K.N.D. Saile, V.Y. Bharadwaj, and G.Y. Vybhavi
2. International Cyberspace Laws: A Review
Manik Garg, Susheela Dahiya, and Keshav Kaushik
3. Unraveling the Dark Web
Susheela Dahiya, Manik Garg, and Keshav Kaushik
4. Memory Acquisition Process for the Linux and Macintosh-Based Operating
System Using Open-Source Tool
Ravi Sheth and Ashish Shukla
5. Deepfakes-A Looming Threat to Our Society
Raahat Devender Singh
6. Challenges in Digital Forensics and Future Aspects
Shreyas S. Muthye
7. Cybercrimes against Women in India: How Can the Law and the Technology
Help the Victims?
Sujata Bali
8. Role of Technology and Prevention of Money Laundering
Smita M. Pachare, Suhasini Verma, and Vidhisha Vyas
9. Novel Cryptographic Hashing Technique for Preserving Integrity in
Forensic Samples
S. Pooja, Vikas Sagar, and Rohit Tanwar
10. Memory Acquisition and Analysis for Forensic Investigation
Tripti Misra, Vanshika Singh, and Tanisha Singla
11. Forensics in Medical Imaging: Techniques and Tools
Bhavana Kaushik and Keshav Kaushik
12. Exploring Face Detection and Recognition in Steganography
Urmila Pilania, Rohit Tanwar, and Neha Nandal
13. Authentication and Admissibility of Forensic Evidence under Indian
Criminal Justice Delivery System: An Analysis
Bharti Nair Khan and Sujata Bali
K.N.D. Saile, V.Y. Bharadwaj, and G.Y. Vybhavi
2. International Cyberspace Laws: A Review
Manik Garg, Susheela Dahiya, and Keshav Kaushik
3. Unraveling the Dark Web
Susheela Dahiya, Manik Garg, and Keshav Kaushik
4. Memory Acquisition Process for the Linux and Macintosh-Based Operating
System Using Open-Source Tool
Ravi Sheth and Ashish Shukla
5. Deepfakes-A Looming Threat to Our Society
Raahat Devender Singh
6. Challenges in Digital Forensics and Future Aspects
Shreyas S. Muthye
7. Cybercrimes against Women in India: How Can the Law and the Technology
Help the Victims?
Sujata Bali
8. Role of Technology and Prevention of Money Laundering
Smita M. Pachare, Suhasini Verma, and Vidhisha Vyas
9. Novel Cryptographic Hashing Technique for Preserving Integrity in
Forensic Samples
S. Pooja, Vikas Sagar, and Rohit Tanwar
10. Memory Acquisition and Analysis for Forensic Investigation
Tripti Misra, Vanshika Singh, and Tanisha Singla
11. Forensics in Medical Imaging: Techniques and Tools
Bhavana Kaushik and Keshav Kaushik
12. Exploring Face Detection and Recognition in Steganography
Urmila Pilania, Rohit Tanwar, and Neha Nandal
13. Authentication and Admissibility of Forensic Evidence under Indian
Criminal Justice Delivery System: An Analysis
Bharti Nair Khan and Sujata Bali
1. Data Hiding-Steganography and Steganalysis
K.N.D. Saile, V.Y. Bharadwaj, and G.Y. Vybhavi
2. International Cyberspace Laws: A Review
Manik Garg, Susheela Dahiya, and Keshav Kaushik
3. Unraveling the Dark Web
Susheela Dahiya, Manik Garg, and Keshav Kaushik
4. Memory Acquisition Process for the Linux and Macintosh-Based Operating
System Using Open-Source Tool
Ravi Sheth and Ashish Shukla
5. Deepfakes-A Looming Threat to Our Society
Raahat Devender Singh
6. Challenges in Digital Forensics and Future Aspects
Shreyas S. Muthye
7. Cybercrimes against Women in India: How Can the Law and the Technology
Help the Victims?
Sujata Bali
8. Role of Technology and Prevention of Money Laundering
Smita M. Pachare, Suhasini Verma, and Vidhisha Vyas
9. Novel Cryptographic Hashing Technique for Preserving Integrity in
Forensic Samples
S. Pooja, Vikas Sagar, and Rohit Tanwar
10. Memory Acquisition and Analysis for Forensic Investigation
Tripti Misra, Vanshika Singh, and Tanisha Singla
11. Forensics in Medical Imaging: Techniques and Tools
Bhavana Kaushik and Keshav Kaushik
12. Exploring Face Detection and Recognition in Steganography
Urmila Pilania, Rohit Tanwar, and Neha Nandal
13. Authentication and Admissibility of Forensic Evidence under Indian
Criminal Justice Delivery System: An Analysis
Bharti Nair Khan and Sujata Bali
K.N.D. Saile, V.Y. Bharadwaj, and G.Y. Vybhavi
2. International Cyberspace Laws: A Review
Manik Garg, Susheela Dahiya, and Keshav Kaushik
3. Unraveling the Dark Web
Susheela Dahiya, Manik Garg, and Keshav Kaushik
4. Memory Acquisition Process for the Linux and Macintosh-Based Operating
System Using Open-Source Tool
Ravi Sheth and Ashish Shukla
5. Deepfakes-A Looming Threat to Our Society
Raahat Devender Singh
6. Challenges in Digital Forensics and Future Aspects
Shreyas S. Muthye
7. Cybercrimes against Women in India: How Can the Law and the Technology
Help the Victims?
Sujata Bali
8. Role of Technology and Prevention of Money Laundering
Smita M. Pachare, Suhasini Verma, and Vidhisha Vyas
9. Novel Cryptographic Hashing Technique for Preserving Integrity in
Forensic Samples
S. Pooja, Vikas Sagar, and Rohit Tanwar
10. Memory Acquisition and Analysis for Forensic Investigation
Tripti Misra, Vanshika Singh, and Tanisha Singla
11. Forensics in Medical Imaging: Techniques and Tools
Bhavana Kaushik and Keshav Kaushik
12. Exploring Face Detection and Recognition in Steganography
Urmila Pilania, Rohit Tanwar, and Neha Nandal
13. Authentication and Admissibility of Forensic Evidence under Indian
Criminal Justice Delivery System: An Analysis
Bharti Nair Khan and Sujata Bali