| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910620201303321 |
|
|
Autore |
Le-Khac Nhien-An |
|
|
Titolo |
A Practical Hands-on Approach to Database Forensics / / by Nhien-An Le-Khac, Kim-Kwang Raymond Choo |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2022.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (302 pages) |
|
|
|
|
|
|
Collana |
|
Studies in Big Data, , 2197-6511 ; ; 116 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Engineering - Data processing |
Computational intelligence |
Big data |
Data Engineering |
Computational Intelligence |
Big Data |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Signal IM App database analysing.-qTox E2EE Database Forensics -- PyBitmessage database investigation -- Data Loss analysing -- IoT Database Forensics - Ring Doorbell case -- Web browser database analysing - Chrome case. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Adopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a crucial source of evidence in any digital investigation. This also reinforces the importance of keeping up to date on the cyber-threat landscape as well as any associated database forensic challenges and approaches. The book also guides cyber-forensic researchers, educators, and practitioners through the process of conducting database forensics and investigations on mobile devices, Internet of Things (IoT) devices, web browsers, and end-to-end encrypted instant messaging applications. Given the fast-changing database forensics landscape, this book will be of interest to |
|
|
|
|
|
|
|
|
|
|
researchers, educators, and practitioners in the field, as well as students who want to learn about the database investigation. . |
|
|
|
|
|
| |