000 | 03160nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-031-16127-8 | ||
003 | DE-He213 | ||
005 | 20240423125104.0 | ||
007 | cr nn 008mamaa | ||
008 | 221021s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031161278 _9978-3-031-16127-8 |
||
024 | 7 |
_a10.1007/978-3-031-16127-8 _2doi |
|
050 | 4 | _aTA345-345.5 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aCOM018000 _2bisacsh |
|
072 | 7 |
_aUN _2thema |
|
082 | 0 | 4 |
_a620.00285 _223 |
100 | 1 |
_aLe-Khac, Nhien-An. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 2 |
_aA Practical Hands-on Approach to Database Forensics _h[electronic resource] / _cby Nhien-An Le-Khac, Kim-Kwang Raymond Choo. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXIV, 291 p. 218 illus., 192 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Big Data, _x2197-6511 ; _v116 |
|
505 | 0 | _aSignal IM App database analysing.-qTox E2EE Database Forensics -- PyBitmessage database investigation -- Data Loss analysing -- IoT Database Forensics - Ring Doorbell case -- Web browser database analysing - Chrome case. | |
520 | _aAdopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a crucial source of evidence in any digital investigation. This also reinforces the importance of keeping up to date on the cyber-threat landscape as well as any associated database forensic challenges and approaches. The book also guides cyber-forensic researchers, educators, and practitioners through the process of conducting database forensics and investigations on mobile devices, Internet of Things (IoT) devices, web browsers, and end-to-end encrypted instant messaging applications. Given the fast-changing database forensics landscape, this book will be of interest to researchers, educators, and practitioners in the field, as well as students who want to learn about the database investigation. . | ||
650 | 0 |
_aEngineering _xData processing. |
|
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aBig data. | |
650 | 1 | 4 | _aData Engineering. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aBig Data. |
700 | 1 |
_aChoo, Kim-Kwang Raymond. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031161261 |
776 | 0 | 8 |
_iPrinted edition: _z9783031161285 |
776 | 0 | 8 |
_iPrinted edition: _z9783031161292 |
830 | 0 |
_aStudies in Big Data, _x2197-6511 ; _v116 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-16127-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c174115 _d174115 |