logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

A Practical Handson Approach To Database Forensics Nhienan Lekhac

  • SKU: BELL-46704170
A Practical Handson Approach To Database Forensics Nhienan Lekhac
$ 31.00 $ 45.00 (-31%)

4.4

92 reviews

A Practical Handson Approach To Database Forensics Nhienan Lekhac instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 13.17 MB
Pages: 301
Author: Nhien-An Le-Khac, Kim-Kwang Raymond Choo
ISBN: 9783031161261, 3031161262
Language: English
Year: 2022

Product desciption

A Practical Handson Approach To Database Forensics Nhienan Lekhac by Nhien-an Le-khac, Kim-kwang Raymond Choo 9783031161261, 3031161262 instant download after payment.

Adopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a crucial source of evidence in any digital investigation. This also reinforces the importance of keeping up to date on the cyber-threat landscape as well as any associated database forensic challenges and approaches. The book also guides cyber-forensic researchers, educators, and practitioners through the process of conducting database forensics and investigations on mobile devices, Internet of Things (IoT) devices, web browsers, and end-to-end encrypted instant messaging applications. Given the fast-changing database forensics landscape, this book will be of interest to researchers, educators, and practitioners in the field, as well as students who want to learn about the database investigation.

 

Related Products