"VV Square"building, Plot.No.TS 710/1b1 & 2B1, CMC Ward No 18, Moka road, Gandhinagar, Ballari-583 101. 583101 Bellari IN
trendypaper
"VV Square"building, Plot.No.TS 710/1b1 & 2B1, CMC Ward No 18, Moka road, Gandhinagar, Ballari-583 101. Bellari, IN
+918050151380 https://www.trendypaper.com/s/5b1a00c581a9afd8ff765190/ms.settings/5256837ccc4abf1d39000001/5b928defbda50e15d4c76434-480x480.png" [email protected]
9789393229243- 63c6912a6b1861848d317629 Cybersecurity & Digital Forensics https://www.trendypaper.com/s/5b1a00c581a9afd8ff765190/64c395d9e41e57d9217cd33b/41psbbsi5xl-_sx389_bo1-204-203-200_.jpg This book is for beginners, cybersecurity and digital forensics enthusiasts, or anyone who wants

to boost their knowledge, skills and want to learn about cybersecurity & digital forensics. This

book explains different programming languages, cryptography, steganography techniques,

networking, web application security, and digital forensics concepts in an evident manner with

examples. This book will enable you to grasp different cybersecurity, digital forensics, and

programming concepts and will allow you to understand how to implement security and break

security in a system for testing purposes. Also, in this book, we will discuss how to manually

perform a forensics investigation for extracting volatile & non-volatile data in Linux and

Windows OS using the command-line interface. In this book, we will mostly use a command-line interface for performing different tasks using programming and commands skills that we will acquire in different chapters.

In this book you will learn:

- Setting up & Managing Virtual Machine in VirtualBox

- Linux OS

- Bash Programming and Scripting

- Useful Utilities in Linux OS

- Python Programming

- How to work on CLI

- How to use programming skills for automating tasks.

- Different Cryptographic techniques such as Symmetric & Asymmetric Cryptography, Digital Signatures, Message Authentication Code, Hashing

- Cryptographic Loopholes

- Steganography techniques for hiding & extracting information

- Networking Concepts such as OSI & TCP/IP Model, IP Addressing, Subnetting, Some Networking Protocols

- Network Security & Wireless Security Protocols

- A Little bit of Web Development

- Detection, Exploitation, and Mitigation of some Web Application Vulnerabilities

- Basic knowledge of some powerful & useful Tools

- Different concepts related to Digital Forensics

- Data Acquisition types and methods

- Manual Extraction of Volatile & Non-Volatile Data from OS artifacts

& Much More Relevant Links: The C Answer Book Books OnlineSelected Stories Of Munshi Premchand Books OnlineHow To Get What You Want Books OnlineGolden Mathematics With Sample Papers A Book With A Difference For Class10 For 2019 Final Exams Books OnlineFinancial Management Text Cum Suggested Answers Books OnlineKim Campbell Books OnlineDynamic Memory Golden Book Of Proverbs Books OnlineThe History Of India For Children Vol 2 Books OnlineTogether With Happy Learning Pullout Worksheets English For Class 4 Books Online
9789393229243-
in stockINR 1150
Clever Fox Publishing
1 1

Description of product

This book is for beginners, cybersecurity and digital forensics enthusiasts, or anyone who wants

to boost their knowledge, skills and want to learn about cybersecurity & digital forensics. This

book explains different programming languages, cryptography, steganography techniques,

networking, web application security, and digital forensics concepts in an evident manner with

examples. This book will enable you to grasp different cybersecurity, digital forensics, and

programming concepts and will allow you to understand how to implement security and break

security in a system for testing purposes. Also, in this book, we will discuss how to manually

perform a forensics investigation for extracting volatile & non-volatile data in Linux and

Windows OS using the command-line interface. In this book, we will mostly use a command-line interface for performing different tasks using programming and commands skills that we will acquire in different chapters.

In this book you will learn:

- Setting up & Managing Virtual Machine in VirtualBox

- Linux OS

- Bash Programming and Scripting

- Useful Utilities in Linux OS

- Python Programming

- How to work on CLI

- How to use programming skills for automating tasks.

- Different Cryptographic techniques such as Symmetric & Asymmetric Cryptography, Digital Signatures, Message Authentication Code, Hashing

- Cryptographic Loopholes

- Steganography techniques for hiding & extracting information

- Networking Concepts such as OSI & TCP/IP Model, IP Addressing, Subnetting, Some Networking Protocols

- Network Security & Wireless Security Protocols

- A Little bit of Web Development

- Detection, Exploitation, and Mitigation of some Web Application Vulnerabilities

- Basic knowledge of some powerful & useful Tools

- Different concepts related to Digital Forensics

- Data Acquisition types and methods

- Manual Extraction of Volatile & Non-Volatile Data from OS artifacts

& Much More Relevant Links: The C Answer Book Books OnlineSelected Stories Of Munshi Premchand Books OnlineHow To Get What You Want Books OnlineGolden Mathematics With Sample Papers A Book With A Difference For Class10 For 2019 Final Exams Books OnlineFinancial Management Text Cum Suggested Answers Books OnlineKim Campbell Books OnlineDynamic Memory Golden Book Of Proverbs Books OnlineThe History Of India For Children Vol 2 Books OnlineTogether With Happy Learning Pullout Worksheets English For Class 4 Books Online

Renting Guidelines

Specification of Products

BrandClever Fox Publishing

User reviews

  0/5