Atjaunināt sīkdatņu piekrišanu

Forensic Investigations and Risk Management in Mobile and Wireless Communications [Multiple-component retail product]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Multiple-component retail product, 314 pages, height x width: 254x178 mm, Contains 1 Hardback and 1 Digital (delivered electronically)
  • Sērija : Advances in Wireless Technologies and Telecommunication
  • Izdošanas datums: 26-Jul-2019
  • Izdevniecība: Business Science Reference
  • ISBN-10: 1799803856
  • ISBN-13: 9781799803850
Citas grāmatas par šo tēmu:
  • Multiple-component retail product
  • Cena: 340,82 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
Forensic Investigations and Risk Management in Mobile and Wireless  Communications
  • Formāts: Multiple-component retail product, 314 pages, height x width: 254x178 mm, Contains 1 Hardback and 1 Digital (delivered electronically)
  • Sērija : Advances in Wireless Technologies and Telecommunication
  • Izdošanas datums: 26-Jul-2019
  • Izdevniecība: Business Science Reference
  • ISBN-10: 1799803856
  • ISBN-13: 9781799803850
Citas grāmatas par šo tēmu:
Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private e-Discovery industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.