Cyber Forensics


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.

About The Book

Threat actors be they cyber criminals terrorists hacktivists or disgruntled employees are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical technical approach to discussing cyber forensics processes and procedures. Instead the authors examine how cyber forensics can be applied to identifying collecting and examining evidential data from emerging and hybrid technologies while taking steps to proactively manage the influence and impact as well as the policy and governance aspects of these technologies and their effect on business operations.A world-class team of cyber forensics researchers investigators practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive manager attorney auditor and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information operational and emerging technologies cyber forensics networks cloud computing and cybersecurity.
downArrow

Details