دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Randal Joyce, Abdulrahman Yarali, Faris Sahawneh سری: Cybercrime and cybersecurity research ISBN (شابک) : 9798886970135 ناشر: Nova Science Publishers سال نشر: 2022 تعداد صفحات: [204] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 13 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Cybersecurity and digital forensics : challenges and future paradigms به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت سایبری و پزشکی قانونی دیجیتال: چالش ها و پارادایم های آینده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Contents Preface Acknowledgments Chapter 1 Introduction to Cybercrime Abstract Introduction Dynamics of Cybercrime Types of Cybercrime Categories of Cybercrime Phishing Spam Hacking Famous Cybercrime Cases Cybercrimes Business Impact Organizational Steps to Prevent Cybercrime Data Protection Strategy Data Breach Prevention Strategy Data Leak Prevention Strategy Data Protection Process Effect on National Defense Guarding against Cyberattack Investigative Techniques for Cybercrime Background Check Information Collecting Tracking Authors Digital Forensics Investigative Cybercrime Agencies Criminal Justice Agencies National Security Agencies Private Security Agencies Chapter 2 Cybercrimes and Cybercriminals: Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks Abstract Introduction Impacts of Cybercrime Types of Cybercrime Cyber Extortion Crypto-Jacking Identity Theft Credit Card Fraud Software Piracy Cyber Espionage Advanced Attacks Distributed DoS (Denial of Service) Data Compromise Website Defacement Website Defacement Prevention Evade the Use of Default Administration Email and Directory Always Reduce the Application of Plug-ins and Add-ons Error Messages Limit File Uploading to the Websites Utilize TLS and SSL Emerging Threats and Issues on Cybercrime Social Media Cloud Computing Smartphones Security Risks with Smartphones Concerns over Wi-Fi Connections Concerns over Bluetooth Connections Other Vulnerabilities Cyber-Attacks on Critical Infrastructure Future Concerns on Cybersecurity Crypto-Jacking and Crypto Mining Cyberwarfare Legislations Concerning Cybercrime Conclusion Chapter 3 A Risk-Aware Path to Cyber Security Resilience and Maturity Abstract Introduction A Mindset Reset Today’s Cyber Security Reality Due Diligence and Negligence Operational Efficacy and Efficiency Security Operations Withstanding Tomorrow’s Threats Conclusion Chapter 4 Security and Privacy Issues in Digital Communications Abstract Introduction Cloud Computing Wireless Body Area Networks Radiofrequency Identification (RFID) Major Security Breaches Backoff PoS Malware Conclusion Chapter 5 National Cyber Security Strategies Abstract Introduction Background Quantifying Cyber Security Principal Functions for Strong Security Methodology Identify Protect Detect Respond Recover Cyber-Attacks and Fatalities Impacts on National Economies Lessons Learned Metrics to Assess the Efficiency of Cybersecurity Strategies Business Perspective Market Challenges for Cybersecurity Economic Perspective The Cybersecurity Industrial Complex The Malicious Cyber Activity Is Aimed at Banks in the Swift Network Malicious Cyber Activity Upsetting Financial Markets Effect of Economies of Cybersecurity on NCSSs Government Perspective Cybersecurity and Social Welfare Cybersecurity as a Public Policy and the Role of the Government Government Intervention Causes of Security Breaches and Attacks Software Zero-Day Susceptibilities “Backdoor” Access Firmware Hardware Cloud Computing Recommendations Conclusion Chapter 6 Digital Forensics Abstract Introduction Historical Implications Importance Forensic Processing Acquisition of Exhibits Analysis Reporting Phases Preservation Collection Examination Analysis of Digital Forensics Scope Examination Focus General Nature of Matter Time Framework Logical Data Data Leakage Scope Limitations Implementation of Process Techniques Live Forensics Data Recovery Passcodes Recovery File Carvings Filtering of Known Files Keyword Research Timeline Analysis Tools Software Validity Open Source vs. Commercial Software Open-Source Software Commercial Source Software Legal Considerations Digital Evidence Issues in Digital Evidence Conclusion Chapter 7 Mobile Forensics: Concepts, Challenges, and Issues Abstract Introduction Mobile Forensic Acquisition Phases Issues in Mobile Forensics Cloud Forensics Conclusion Chapter 8 IoT Forensics Abstract Introduction Cyber Security Issues and IoT Forensics Need for IoT Forensics Implications of IoT Forensics Procedural Intimations IoT Readiness Preparation Collection Examination Analysis and Reporting of Evidence IoT Investigation Preparation Collection Examination Analysis Reporting of Evidence Evidence Preservation Security Provenance API Evidencing Taxonomy of IoT Forensics Phases of Forensics Evidence Sources Frameworks Enablers Modes of Investigation Layers of Forensics IoT Forensics and Sources of Evidence Smart Devices and Sensors Hardware Implications Software Insinuations External Resources Opportunities Developed by IoT Forensics Challenges Developed by IoT Forensics Challenges Developed during IoT Readiness Challenges Developed during IoT Investigation Preparation Collection Analysis Reporting Conclusion Chapter 9 Cybersecurity: Trending Issues Abstract Introduction Identity, Privacy, and Trust Management Malware Research Forensics Trends Data and Policy Management Cybercrime and Underground Technology Risk Management, Economics, and Regulation Secure Design, Tooling, and Engineering Phishing Attacks IoT Ransomware Increased Data Privacy Regulation Cyber Attacks on Mobile Devices Increased Investment in Automation Security Automation Conclusion Chapter 10 Artificial Intelligence: Cybersecurity and Security Threats Abstract Introduction Cybersecurity in Its Current State AI as a Concept AI: A Solution for Cybersecurity AI: New Challenges in Cybersecurity Conclusion References Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Additional Sources Authors’ Contact Information Index Blank Page Blank Page