Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing.
Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics
Covers advanced tools in the domain of data hiding and steganalysis
Discusses the role and application of artificial intelligence and big data in cybersecurity
Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues
Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics
The text is primarily written for senior undergraduates, graduate students, and academic researchers, in the fields of computer science, electrical engineering, cybersecurity, and forensics.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing.
Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics
Covers advanced tools in the domain of data hiding and steganalysis
Discusses the role and application of artificial intelligence and big data in cybersecurity
Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues
Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics
The text is primarily written for senior undergraduates, graduate students, and academic researchers, in the fields of computer science, electrical engineering, cybersecurity, and forensics.