|
Showing 1 - 2 of
2 matches in All Departments
Mobile forensics has grown from a relatively obscure tradecraft to
a crucial part of many criminal investigations, and is now used
daily by examiners and analysts within local, state, and federal
law enforcement as well as within the military, US government
organizations, and the private "e-Discovery" industry. Developments
in forensic research, tools, and processes over the past decade
have been very successful and continue to change at a rapid pace.
Forensic Investigations and Risk Management in Mobile and Wireless
Communications is a collection of innovative research on the
methods and applications of analyzing mobile devices and data for
collection of information pertaining to the legal evidence related
to various security breaches and intrusion detection. While
highlighting topics including cybercrime, neural networks, and
smartphone security, this book is ideally designed for security
analysts, IT professionals, researchers, practitioners,
academicians, and students currently investigating the
up-and-coming aspects surrounding network security, computer
science, and security engineering.
Mobile forensics has grown from a relatively obscure tradecraft to
a crucial part of many criminal investigations, and is now used
daily by examiners and analysts within local, state, and federal
law enforcement as well as within the military, US government
organizations, and the private ""e-Discovery"" industry.
Developments in forensic research, tools, and processes over the
past decade have been very successful and continue to change at a
rapid pace. Forensic Investigations and Risk Management in Mobile
and Wireless Communications is a collection of innovative research
on the methods and applications of analyzing mobile devices and
data for collection of information pertaining to the legal evidence
related to various security breaches and intrusion detection. While
highlighting topics including cybercrime, neural networks, and
smartphone security, this book is ideally designed for security
analysts, IT professionals, researchers, practitioners,
academicians, and students currently investigating the
up-and-coming aspects surrounding network security, computer
science, and security engineering.
|
You may like...
Higher
Michael Buble
CD
(1)
R487
Discovery Miles 4 870
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|