Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/advanced-techniques-and-applications-of-cybersecurity-and-forensics/descriptif_5081863
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=5081863

Advanced Techniques and Applications of Cybersecurity and Forensics Emerging Technologies Series

Langue : Anglais

Coordonnateurs : Kaushik Keshav, Ouaissa Mariya, Chaudhary Aryan

Couverture de l’ouvrage Advanced Techniques and Applications of Cybersecurity and Forensics

The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitations tools that are used in the domain of ethical hacking and penetration testing.

· Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics

· Covers advanced tools in the domain of data hiding and steganalysis

· Discusses the role and application of artificial intelligence and big data in cybersecurity

· Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues

· Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics

The text is primarily written for senior undergraduate, graduate students, and academic researchers, in the fields of computer science, electrical engineering, cybersecurity, and forensics.

1. Advanced Cyber Security Tools and Techniques 2. Advanced Forensics open-source tools 3. Artificial Intelligence and Machine Learning Enabled Cyber Security Tools and Techniques 4. IoT Forensics 5. BIG DATA FORENSICS: CHALLENGES AND APPROACHES 6. Drone Forensics 7. Ransomware Attacks on IoT Devices 8. A CRITICAL ANALYSIS OF PRIVACY IMPLICATIONS SURROUNDING ALEXA AND VOICE ASSISTANTS 9 Zeus: In-Depth Malware Analysis of Banking Trojan Malware 10. Villain: Malware Analysis and Antivirus Evasion of a Backdoor Generator 11. An Investigation of Memory Forensics in kernel Data structure 12. Analysis and Impacts of Avast Antivirus Vulnerabilities 13. How to Recover Deleted Data from SSD Drives after TRIM 14. Early Validation of Investigation Process Model 15. Darkweb Forensics

Academic, Postgraduate, and Undergraduate Advanced

Keshav Kaushik is an experienced educator with over nine years of teaching and research experience in Cybersecurity, Digital Forensics, and the Internet of Things. He is working as an Assistant Professor (Senior Scale) in the School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. He has published 90+ research papers in International Journals and has presented at reputed International Conferences. He is a Certified Ethical Hacker (CEH) v11, CQI and IRCA Certified ISO/IEC 27001:2013 Lead Auditor, Quick Heal Academy Certified Cyber Security Professional (QCSP), and IBM Cybersecurity Analyst. He acted as a keynote speaker and delivered 50+ professional talks on various national and international platforms. He has edited over fifteen books with reputed international publishers like Springer, Taylor and Francis, IGI Global, Bentham Science, etc. He has chaired various special sessions at international conferences and also served as a reviewer in peer-reviewed journals and conferences.

Dr. Mariya Ouaissa is currently a Professor in Cybersecurity and practitioner with industry and academic experience. She is a Ph.D. graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga, Morocco. She is a Co-Founder and IT Consultant at IT Support and Consulting Center. She was working for School of Technology of Meknes Morocco as a Visiting Professor from 2013 to 2021. She is member of the International Association of Engineers and International Association of Online Engineering, and since 2021, she is an "ACM Professional Member". She is Expert Reviewer with Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has served and continues to serve on technical progr

Date de parution :

15.6x23.4 cm

À paraître, réservez-le dès maintenant

148,11 €

Ajouter au panier