001450643 000__ 03257cam\a2200553\i\4500 001450643 001__ 1450643 001450643 003__ OCoLC 001450643 005__ 20230310004536.0 001450643 006__ m\\\\\o\\d\\\\\\\\ 001450643 007__ cr\cn\nnnunnun 001450643 008__ 221025s2022\\\\sz\a\\\\ob\\\\000\0\eng\d 001450643 019__ $$a1348633964 001450643 020__ $$a9783031161278$$q(electronic bk.) 001450643 020__ $$a3031161270$$q(electronic bk.) 001450643 020__ $$z3031161262 001450643 020__ $$z9783031161261 001450643 0247_ $$a10.1007/978-3-031-16127-8$$2doi 001450643 035__ $$aSP(OCoLC)1348694410 001450643 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCF$$dUKAHL$$dOCLCQ 001450643 049__ $$aISEA 001450643 050_4 $$aHV8078.7 001450643 08204 $$a363.250285$$223/eng/20221025 001450643 1001_ $$aLe-Khac, Nhien-An,$$d1972-$$eauthor. 001450643 24512 $$aA practical hands-on approach to database forensics /$$cNhien-An Le-Khac, Kim-Kwang Raymond Choo. 001450643 264_1 $$aCham :$$bSpringer,$$c[2022] 001450643 264_4 $$c©2022 001450643 300__ $$a1 online resource (xiv, 291 pages) :$$billustrations (chiefly color). 001450643 336__ $$atext$$btxt$$2rdacontent 001450643 337__ $$acomputer$$bc$$2rdamedia 001450643 338__ $$aonline resource$$bcr$$2rdacarrier 001450643 4901_ $$aStudies in big data ;$$vvolume 116 001450643 504__ $$aIncludes bibliographical references. 001450643 5050_ $$aSignal IM App database analysing.-qTox E2EE Database Forensics -- PyBitmessage database investigation -- Data Loss analysing -- IoT Database Forensics - Ring Doorbell case -- Web browser database analysing - Chrome case. 001450643 506__ $$aAccess limited to authorized users. 001450643 520__ $$aAdopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a crucial source of evidence in any digital investigation. This also reinforces the importance of keeping up to date on the cyber-threat landscape as well as any associated database forensic challenges and approaches. The book also guides cyber-forensic researchers, educators, and practitioners through the process of conducting database forensics and investigations on mobile devices, Internet of Things (IoT) devices, web browsers, and end-to-end encrypted instant messaging applications. Given the fast-changing database forensics landscape, this book will be of interest to researchers, educators, and practitioners in the field, as well as students who want to learn about the database investigation. . 001450643 588__ $$aDescription based on print version record. 001450643 650_0 $$aDigital forensic science. 001450643 650_0 $$aDatabase security. 001450643 650_0 $$aComputer crimes$$xInvestigation$$xData processing. 001450643 655_0 $$aElectronic books. 001450643 7001_ $$aChoo, Kim-Kwang Raymond,$$eauthor. 001450643 77608 $$iPrint version:$$aLE-KHAC, NHIEN-AN. CHOO, KIM-KWANG RAYMOND.$$tPRACTICAL HANDS-ON APPROACH TO DATABASE FORENSICS.$$d[Place of publication not identified] : SPRINGER INTERNATIONAL PU, 2022$$z3031161262$$w(OCoLC)1338132739 001450643 830_0 $$aStudies in big data ;$$vv. 116. 001450643 852__ $$bebk 001450643 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-16127-8$$zOnline Access$$91397441.1 001450643 909CO $$ooai:library.usi.edu:1450643$$pGLOBAL_SET 001450643 980__ $$aBIB 001450643 980__ $$aEBOOK 001450643 982__ $$aEbook 001450643 983__ $$aOnline 001450643 994__ $$a92$$bISE