01072nam a22002653i 450099100353855970753620040504151033.0040802s1961 it |||||||||||||||||ita b13089389-39ule_instARCHE-104199ExLBiblioteca Interfacoltà itaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.841Cremonesi, Carla156136Corso di letteratura francese :la poesia lirica francese tra Villon e Malherbe : anno accademico 1960-1961Milano :La goliardica,1961256 p. ;25 cmIn testa al front.: Università degli studi di MilanoLitografatoPoesia lirica franceseSec. 15.-17..b1308938902-04-1405-08-04991003538559707536LE002 Fondo Giudici H 84112002000301017le002C. 1-E0.00-no 00000.i1372192605-08-04Corso di letteratura francese289961UNISALENTOle00205-08-04ma -itait 0103116nam 22006015 450 991062020130332120250504232013.09783031161278303116127010.1007/978-3-031-16127-8(MiAaPQ)EBC7120641(Au-PeEL)EBL7120641(CKB)25188935500041(PPN)265858267(DE-He213)978-3-031-16127-8(EXLCZ)992518893550004120221021d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierA Practical Hands-on Approach to Database Forensics /by Nhien-An Le-Khac, Kim-Kwang Raymond Choo1st ed. 2022.Cham :Springer International Publishing :Imprint: Springer,2022.1 online resource (302 pages)Studies in Big Data,2197-6511 ;116Print version: Le-Khac, Nhien-An A Practical Hands-On Approach to Database Forensics Cham : Springer International Publishing AG,c2022 9783031161261 Signal IM App database analysing.-qTox E2EE Database Forensics -- PyBitmessage database investigation -- Data Loss analysing -- IoT Database Forensics - Ring Doorbell case -- Web browser database analysing - Chrome case.Adopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a crucial source of evidence in any digital investigation. This also reinforces the importance of keeping up to date on the cyber-threat landscape as well as any associated database forensic challenges and approaches. The book also guides cyber-forensic researchers, educators, and practitioners through the process of conducting database forensics and investigations on mobile devices, Internet of Things (IoT) devices, web browsers, and end-to-end encrypted instant messaging applications. Given the fast-changing database forensics landscape, this book will be of interest to researchers, educators, and practitioners in the field, as well as students who want to learn about the database investigation. .Studies in Big Data,2197-6511 ;116EngineeringData processingComputational intelligenceBig dataData EngineeringComputational IntelligenceBig DataEngineeringData processing.Computational intelligence.Big data.Data Engineering.Computational Intelligence.Big Data.005.8Le-Khac Nhien-An1263238Choo Kim-Kwang RaymondMiAaPQMiAaPQMiAaPQBOOK9910620201303321A practical hands-on approach to database forensics3059126UNINA