|
|
|
|
LEADER |
04814nam a22006375i 4500 |
001 |
978-3-030-60425-7 |
003 |
DE-He213 |
005 |
20210623060234.0 |
007 |
cr nn 008mamaa |
008 |
201209s2021 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030604257
|9 978-3-030-60425-7
|
024 |
7 |
|
|a 10.1007/978-3-030-60425-7
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Digital Forensic Investigation of Internet of Things (IoT) Devices
|h [electronic resource] /
|c edited by Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson.
|
250 |
|
|
|a 1st ed. 2021.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2021.
|
300 |
|
|
|a VIII, 285 p. 91 illus., 85 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advanced Sciences and Technologies for Security Applications,
|x 1613-5113
|
505 |
0 |
|
|a 1. Emulation vs Instrumentation for Android Malware Detection -- 2. Towards a Generic Approach of Quantifying Evidence Volatility in Resource Constrained Devices -- 3. Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence -- 4. Drone Forensics: The impact and Challenges -- 5. Intrusion Detection and CAN Vehicle Networks.
|
520 |
|
|
|a This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and ‘smart’ home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics. .
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Internet of things.
|
650 |
|
0 |
|a Embedded computer systems.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a System safety.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Mobile and Network Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28050
|
650 |
2 |
4 |
|a Cyber-physical systems, IoT.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/T24080
|
650 |
2 |
4 |
|a Computer Crime.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28070
|
650 |
2 |
4 |
|a Security Science and Technology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/P31080
|
700 |
1 |
|
|a Montasari, Reza.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Jahankhani, Hamid.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Hill, Richard.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Parkinson, Simon.
|e editor.
|0 (orcid)0000-0002-1747-9914
|1 https://orcid.org/0000-0002-1747-9914
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030604240
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030604264
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030604271
|
830 |
|
0 |
|a Advanced Sciences and Technologies for Security Applications,
|x 1613-5113
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-60425-7
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|