Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

ISBN-10:
0128053038
ISBN-13:
9780128053034
Pub. Date:
10/12/2016
Publisher:
Elsevier Science
ISBN-10:
0128053038
ISBN-13:
9780128053034
Pub. Date:
10/12/2016
Publisher:
Elsevier Science
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

$99.95 Current price is , Original price is $99.95. You
$99.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices.

This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges.


Product Details

ISBN-13: 9780128053034
Publisher: Elsevier Science
Publication date: 10/12/2016
Pages: 326
Product dimensions: 7.40(w) x 9.20(h) x 0.80(d)

About the Author

Kim-Kwang Raymond Choo is currently a cloud technology endowed associate professor at University of Texas at San Antonio, an associate professor at the University of South Australia, and a guest professor at China University of Geosciences. He has been an invited speaker for a number of events, such as the 2011 UNODC-ITU Asia-Pacific Regional Workshop on Fighting Cybercrime, the Korean (Government) Institute of Criminology (2013), the UNAFEI and UAE Government conference in 2014, and the World Internet Conference (Wuzhen Summit) in 2014, jointly organized by the Cyberspace Administration of China and the People's Government of Zhejiang Province. He has also been a Keynote/Plenary Speaker at conferences such as SERENE-RISC Spring 2016 Workshop, IEEE International Conference on Data Science and Data Intensive Systems (DSDIS 2015) and those organised by Infocomm Development Authority of Singapore, A*Star, Nanyang Technological University and Singapore Management University (2015) , Cloud Security Alliance New Zealand (2015), CSO Australia and Trend Micro (2015) , Anti-Phishing Working Group (2014), National Taiwan University of Science and Technology (2014), Asia Pacific University of Technology & Innovation (Malaysia; 2014), Nanyang Technological University (Singapore; 2011), and National Chiayi University (Taiwan; 2010); and an Invited Expert at UNAFEI Criminal Justice Training in 2015, at INTERPOL Cyber Research Agenda Workshop 2015, and at Taiwan Ministry of Justice Investigation Bureau’s 2015 International Symposium on Regional Security and Transnational Crimes . He was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine / Microsoft’s Next 100 series in 2009, and is the recipient of various awards including ESORICS 2015 Best Research Paper Award, Winning Team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015, Highly Commended Award from Australia New Zealand Policing Advisory Agency in 2014, Fulbright Scholarship in 2009, British Computer Society’s Wilkes Award in 2008, and 2008 Australia Day Achievement Medallion. He is a Fellow of the Australian Computer Society, and a Senior Member of the IEEE.

Ali Dehghantanha is serving as a Mari-Curie International Incoming Research Fellow in cyber forensics at University of Salford, Manchester, UK. Ali has served for several years in a variety of industrial and academic positions with leading players in Cyber-Security and Digital Forensics. He has a long history of working in different areas of computer security as a security researcher, malware analyzer, penetration tester, security consultant, and forensic analyst. He regularly travels the globe on speaking, teaching, and consulting engagements and assist clients in securing their information assets. Ali is imminently qualified in the field of cyber-security; he holds Ph.D in Security in Computing and a number of professional qualifications namely GREM, CCFP,CISSP, CISM ISMS L.A, CEH, CHFI, ECSA, and ECIH and he is the founder of annual “International Conference in Cyber-Security, Cyber Warfare and Digital Forensics (CyberSec)”.

Table of Contents

Chapter 1: Contemporary Digital Forensics Investigations of Cloud and Mobile Applications

Chapter 2: Forensics Analysis of Android Mobile VoIP Apps

Chapter 3: Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine

Chapter 4: Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies

Chapter 5: Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies

Chapter 6: Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors

Chapter 7: Performance of Android Forensics Data Recovery Tools

Chapter 8: Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model

Chapter 9: Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory

Chapter 10: Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics

Chapter 11: Forensic Visualization: Survey and Future Research Directions

Chapter 12: Investigating Storage as a Service Cloud Platform: pCloud as a Case Study

Chapter 13: Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud

Chapter 14: Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies

Chapter 15: An Android Cloud Storage Apps Forensic Taxonomy

What People are Saying About This

From the Publisher

Presents work from thought leaders who provide cutting-edge research in digital forensic investigations for cloud and mobile device applications

From the B&N Reads Blog

Customer Reviews