The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing.* Focuses on too
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing.* Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics* Covers advanced tools in the domain of data hiding and steganalysis* Discusses the role and application of artificial intelligence and big data in cybersecurity* Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues* Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensicsThe text is primarily written for senior undergraduates, graduate students, and academicresearchers, in the fields of computer science, electrical engineering, cybersecurity,and forensics.
Our site uses cookies and similar technologies to offer you a better experience. We use analytical cookies (our own and third party) to understand and improve your browsing experience, and advertising cookies (our own and third party) to send you advertisements in line with your preferences. To modify or opt-out of the use of some or all of our cookies, please go to “Manage Cookies” or view our Cookie Policy to find out more. By clicking “Accept all” you consent to the use of these cookies.