000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230420b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781032244686 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.252 |
Item number |
MOU |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Moustafa, Nour |
245 ## - TITLE STATEMENT |
Title |
Digital forensics in the Era of Artificial Intelligence |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
CRC Press, |
Place of publication, distribution, etc |
Boca raton : |
Date of publication, distribution, etc |
2022 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xx, 236 p ; |
Other physical details |
ill., (b & w), |
Dimensions |
24 cm |
365 ## - TRADE PRICE |
Price amount |
42.99 |
Price type code |
GBP |
Unit of pricing |
104.20 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Digital forensic science |
|
Topical term or geographic name as entry element |
Online safety, Privacy |
|
Topical term or geographic name as entry element |
Autopsy |
|
Topical term or geographic name as entry element |
Boot sector |
|
Topical term or geographic name as entry element |
Digital investigation process |
|
Topical term or geographic name as entry element |
Digital forensics |
|
Topical term or geographic name as entry element |
File system |
|
Topical term or geographic name as entry element |
Supervised learning |
|
Topical term or geographic name as entry element |
TON-IOT dataset |
|
Topical term or geographic name as entry element |
Volume slack |
|
Topical term or geographic name as entry element |
WinHex |
|
Topical term or geographic name as entry element |
Machine learning |
|
Topical term or geographic name as entry element |
Harddisk analysis |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |