ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cybersecurity and digital forensics : challenges and future paradigms

دانلود کتاب امنیت سایبری و پزشکی قانونی دیجیتال: چالش ها و پارادایم های آینده

Cybersecurity and digital forensics : challenges and future paradigms

مشخصات کتاب

Cybersecurity and digital forensics : challenges and future paradigms

ویرایش:  
نویسندگان: , ,   
سری: Cybercrime and cybersecurity research 
ISBN (شابک) : 9798886970135 
ناشر: Nova Science Publishers 
سال نشر: 2022 
تعداد صفحات: [204] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 13 Mb 

قیمت کتاب (تومان) : 31,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Cybersecurity and digital forensics : challenges and future paradigms به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب امنیت سایبری و پزشکی قانونی دیجیتال: چالش ها و پارادایم های آینده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Contents
Preface
Acknowledgments
Chapter 1
Introduction to Cybercrime
	Abstract
	Introduction
	Dynamics of Cybercrime
		Types of Cybercrime
	Categories of Cybercrime
		Phishing
		Spam
		Hacking
	Famous Cybercrime Cases
	Cybercrimes Business Impact
	Organizational Steps to Prevent Cybercrime
		Data Protection Strategy
		Data Breach Prevention Strategy
		Data Leak Prevention Strategy
	Data Protection Process
	Effect on National Defense
	Guarding against Cyberattack
	Investigative Techniques for Cybercrime
		Background Check
		Information Collecting
		Tracking Authors
		Digital Forensics
	Investigative Cybercrime Agencies
		Criminal Justice Agencies
		National Security Agencies
		Private Security Agencies
Chapter 2
Cybercrimes and Cybercriminals:  Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks
	Abstract
	Introduction
	Impacts of Cybercrime
	Types of Cybercrime
		Cyber Extortion
		Crypto-Jacking
		Identity Theft
		Credit Card Fraud
		Software Piracy
		Cyber Espionage
	Advanced Attacks
		Distributed DoS (Denial of Service)
		Data Compromise
		Website Defacement
			Website Defacement Prevention
			Evade the Use of Default Administration Email and Directory
			Always Reduce the Application of Plug-ins and Add-ons
			Error Messages
			Limit File Uploading to the Websites
			Utilize TLS and SSL
	Emerging Threats and Issues on Cybercrime
		Social Media
		Cloud Computing
		Smartphones
		Security Risks with Smartphones
		Concerns over Wi-Fi Connections
		Concerns over Bluetooth Connections
		Other Vulnerabilities
		Cyber-Attacks on Critical   Infrastructure
			Future Concerns on Cybersecurity
		Crypto-Jacking and Crypto Mining
		Cyberwarfare
	Legislations Concerning Cybercrime
	Conclusion
Chapter 3
A Risk-Aware Path to Cyber Security Resilience and Maturity
	Abstract
	Introduction
	A Mindset Reset
	Today’s Cyber Security Reality
	Due Diligence and Negligence
	Operational Efficacy and Efficiency
	Security Operations
	Withstanding Tomorrow’s Threats
	Conclusion
Chapter 4
Security and Privacy Issues  in Digital Communications
	Abstract
	Introduction
	Cloud Computing
	Wireless Body Area Networks
	Radiofrequency Identification (RFID)
	Major Security Breaches
	Backoff PoS Malware
	Conclusion
Chapter 5
National Cyber Security Strategies
	Abstract
	Introduction
	Background
		Quantifying Cyber Security
		Principal Functions for Strong Security Methodology
			Identify
			Protect
			Detect
			Respond
			Recover
		Cyber-Attacks and Fatalities
			Impacts on National Economies
			Lessons Learned
		Metrics to Assess the Efficiency of Cybersecurity Strategies
	Business Perspective
		Market Challenges for Cybersecurity
	Economic Perspective
		The Cybersecurity Industrial Complex
			The Malicious Cyber Activity Is Aimed at Banks in the Swift Network
			Malicious Cyber Activity Upsetting Financial Markets
		Effect of Economies of Cybersecurity on NCSSs
	Government Perspective
		Cybersecurity and Social Welfare
		Cybersecurity as a Public Policy and the Role of the Government
		Government Intervention
	Causes of Security Breaches and Attacks
		Software
		Zero-Day Susceptibilities
		“Backdoor” Access
			Firmware
			Hardware
			Cloud Computing
	Recommendations
	Conclusion
Chapter 6
Digital Forensics
	Abstract
	Introduction
	Historical Implications
		Importance
		Forensic Processing
		Acquisition of Exhibits
		Analysis
		Reporting
		Phases
			Preservation
			Collection
			Examination
		Analysis of Digital Forensics
			Scope
			Examination Focus
			General Nature of Matter
			Time Framework
			Logical Data
			Data Leakage
			Scope Limitations
		Implementation of Process
		Techniques
			Live Forensics
			Data Recovery
			Passcodes Recovery
			File Carvings
			Filtering of Known Files
			Keyword Research
			Timeline Analysis
		Tools
			Software Validity
	Open Source vs. Commercial Software
		Open-Source Software
		Commercial Source Software
		Legal Considerations
		Digital Evidence
		Issues in Digital Evidence
	Conclusion
Chapter 7
Mobile Forensics:  Concepts, Challenges, and Issues
	Abstract
	Introduction
	Mobile Forensic Acquisition Phases
	Issues in Mobile Forensics
	Cloud Forensics
	Conclusion
Chapter 8
IoT Forensics
	Abstract
	Introduction
	Cyber Security Issues and IoT Forensics
		Need for IoT Forensics
		Implications of IoT Forensics
	Procedural Intimations
	IoT Readiness
		Preparation
		Collection
		Examination
		Analysis and Reporting of Evidence
	IoT Investigation
		Preparation
		Collection
		Examination
		Analysis
		Reporting of Evidence
		Evidence Preservation
		Security Provenance
		API Evidencing
		Taxonomy of IoT Forensics
		Phases of Forensics
		Evidence Sources
		Frameworks
		Enablers
		Modes of Investigation
		Layers of Forensics
	IoT Forensics and Sources of Evidence
		Smart Devices and Sensors
		Hardware Implications
		Software Insinuations
		External Resources
	Opportunities Developed by IoT Forensics
		Challenges Developed by IoT Forensics
	Challenges Developed during IoT Readiness
	Challenges Developed during IoT Investigation
		Preparation
		Collection
		Analysis
		Reporting
	Conclusion
Chapter 9
Cybersecurity: Trending Issues
	Abstract
	Introduction
	Identity, Privacy, and Trust Management
	Malware Research
	Forensics Trends
	Data and Policy Management
	Cybercrime and Underground Technology
	Risk Management, Economics, and Regulation
	Secure Design, Tooling, and Engineering
	Phishing Attacks
	IoT Ransomware
	Increased Data Privacy Regulation
	Cyber Attacks on Mobile Devices
	Increased Investment in Automation
	Security Automation
	Conclusion
Chapter 10
Artificial Intelligence:  Cybersecurity and Security Threats
	Abstract
	Introduction
	Cybersecurity in Its Current State
	AI as a Concept
	AI: A Solution for Cybersecurity
	AI: New Challenges in Cybersecurity
	Conclusion
References
	Chapter 1
	Chapter 2
	Chapter 3
	Chapter 4
	Chapter 5
	Chapter 6
	Chapter 7
	Chapter 8
	Chapter 9
	Additional Sources
Authors’ Contact Information
Index
Blank Page
Blank Page




نظرات کاربران