Atjaunināt sīkdatņu piekrišanu
  • Formāts - PDF+DRM
  • Cena: 37,56 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

In today’s world, cybersecurity attacks and security breaches are becoming the norm.  Unfortunately, we are not immune to it, and any individual and entity is at dire risk.  The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all.  But even when a security breach does indeed happen, the immediate reaction is to contain it so that it does not penetrate further into the IT/Network Infrastructure.  From there, mission-critical processes need to be restored, until the business can resume a normal state of operations, like it was before the security breach.

But another key step here is to investigate how and why the security breach happened in the first place.  The best to do this is through what is known as “Digital Forensics”.  This is where specially trained Digital Forensics Investigators collect and comb through every piece of evidence to determine this.  Eventually, the goal is then to use this evidence in a court of law so the cyberattacker can be made to answer to their crime and eventually be brought to justice.

However, the area of digital forensics is a large one, and many topics around it can be covered.  Also, generative AI is being used to not only help in the analysis of the evidence, but also to help automate the Digital Forensics software packages that are available today.  Therefore, in this book, the following is covered:

  • Examples of security breaches, and overview into Digital Forensics
  • How Digital Forensics can be used to investigate the loss or theft of data
  • An introduction to the SQL Server Database
  • A review of the SQL Injection Attack
  • How generative AI can be used in Digital Forensics


A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as “Digital Forensics”. This is where specially trained Digital Forensics Investigators collect and comb through every piece of evidence to determine this.

Acknowledgements.
Chapter 1: Security Breaches and Overview Into Digital
Forensics.
Chapter 2: Digital Forensics, Data Loss, and the SQL Server
Database.
Chapter 3: An Overview Into The SQL Injection Attack
Chapter. 4:
Conclusions Using Generative AI In Digital Forensics. Index.
Ravindra Das is a technical writer in the cybersecurity realm. He also does cybersecurity consulting on the side through his private practice, ML Tech, Inc. He holds the Certified in Cybersecurity certification from the ISC(2).