A Hands-on Practical Approach
De som köpt den här boken har ofta också köpt The Courage To Be Disliked av Ichiro Kishimi, Fumitake Koga (häftad).
Köp båda 2 för 1499 krXiaodong Lin received the PhD degree in Information Engineering from Beijing University of Posts and Telecommunications, China, and the PhD degree (with Outstanding Achievement in Graduate Studies Award) in Electrical and Computer Engineering from the University of Waterloo, Canada. He is currently working as an Associate Professor in the School of Computer Science at the University of Guelph, Canada. His research interests include wireless communications and network security, computer forensics, software security, and applied cryptography. With the increasing advance of wireless technology and the worldwide wireless network deployment, wireless networks have been on an upswing to enable ubiquitous Internet access. Making these wireless networks secure has become a major priority to keep our cyber world safe. In the past years, his research has focused on securing vehicular ad-hoc networks (VANETs), which is an emerging wireless network paradigm. He is elevated to IEEE Fellow for his contributions in secure and privacy-preserving vehicular communications. Also, He has been researching digital forensics extensively. For example, his work on automated forensic analysis of Android applications appears at DFRWS USA 2018, a top research conference in the field of digital forensics.Dr. Lin serves as an Associate Editor for many international journals. He has served or is serving as a guest editor for many special issues of IEEE, Elsevier and Springer journals and as a symposium chair or track chair for IEEE/ACM conferences. He also served on many program committees. He was Chair of Communications and Information Security Technical Committee (CISTC) (2016-2017), IEEE Communications Society (ComSoc). He is a Fellow of the IEEE. He is also a CISSP (Certified Information Systems Security Professional).
1 Introduction to Computer Forensics.- 2 Introduction to Computer Organization.- 3 Building a Forensics Workstation.- 4 Volume Analysis.- 5 Examining FAT File System.- 6 Deleted File Recovery in FAT.- 7 Examining NTFS File System.- 8 Deleted File Recovery in NTFS.- 9 File Carving.- 10 File Signature Searching Forensics.- 11 Keyword Forensics.- 12 Timeline Analysis.- 13 Data Hiding and Detection.- 14 Log Analysis.- 15 Android Forensics.- 16 GPS Forensics.- 17 SIM Cards Forensics.- 18 Introductory Malware Analysis.- 19 Ransomware Analysis.- 20 Image Forgery Detection.- 21 Steganography and Steganalysis.