000 | 04390nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-60425-7 | ||
003 | DE-He213 | ||
005 | 20240423130233.0 | ||
007 | cr nn 008mamaa | ||
008 | 201209s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030604257 _9978-3-030-60425-7 |
||
024 | 7 |
_a10.1007/978-3-030-60425-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aDigital Forensic Investigation of Internet of Things (IoT) Devices _h[electronic resource] / _cedited by Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aVIII, 285 p. 91 illus., 85 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
505 | 0 | _a1. Emulation vs Instrumentation for Android Malware Detection -- 2. Towards a Generic Approach of Quantifying Evidence Volatility in Resource Constrained Devices -- 3. Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence -- 4. Drone Forensics: The impact and Challenges -- 5. Intrusion Detection and CAN Vehicle Networks. | |
520 | _aThis book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and ‘smart’ home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics. . | ||
650 | 0 | _aData protection. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 | _aComputer crimes. | |
650 | 0 | _aSecurity systems. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aComputer Crime. |
650 | 2 | 4 | _aSecurity Science and Technology. |
700 | 1 |
_aMontasari, Reza. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJahankhani, Hamid. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHill, Richard. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aParkinson, Simon. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030604240 |
776 | 0 | 8 |
_iPrinted edition: _z9783030604264 |
776 | 0 | 8 |
_iPrinted edition: _z9783030604271 |
830 | 0 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-60425-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c186493 _d186493 |