Generative AI and digital forensics:
In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all. B...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press, Taylor & Francis Group
2025
|
Schlagworte: | |
Zusammenfassung: | In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all. But even when a security breach does indeed happen, the immediate reaction is to contain it so that it does not penetrate further into the information technology/network infrastructure. From there, mission-critical processes need to be restored, until the business can resume a normal state of operations, like it was before the security breach.But another key step here is to investigate how and why the security breach happened in the first place. The best way to do this is through what is known as "digital forensics". This is where specially trained digital forensics investigators collect and comb through every piece of evidence to determine this. Eventually, the goal is then to use this evidence in a court of law so the cyberattacker can be made to answer for their crime and eventually be brought to justice.However, the area of digital forensics is a large one, and many topics around it can be covered. Also, generative AI is being used to not only help in the analysis of the evidence but also to help automate the digital forensics software packages that are available today. Therefore, in this book, the following is covered:- Examples of security breaches and overview of digital forensics.- How digital forensics can be used to investigate the loss or theft of data.- An introduction to the SQL Server Database.- A review of the SQL Injection Attack.- How generative AI can be used in digital forensics |
Beschreibung: | Acknowledgements. Chapter 1: Security Breaches and Overview Into Digital Forensics. Chapter 2: Digital Forensics, Data Loss, and the SQL Server Database. Chapter 3: An Overview Into The SQL Injection Attack Chapter. 4: Conclusions – Using Generative AI In Digital Forensics. Index. |
Beschreibung: | ix, 101 Seiten Illustrationen 234 mm |
ISBN: | 9781032742458 9781032744865 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV050040564 | ||
003 | DE-604 | ||
005 | 20250122 | ||
007 | t| | ||
008 | 241122s2025 xx a||| |||| 00||| eng d | ||
020 | |a 9781032742458 |c hbk |9 978-1-032-74245-8 | ||
020 | |a 9781032744865 |c pbk |9 978-1-032-74486-5 | ||
024 | 3 | |a 9781032744865 | |
035 | |a (OCoLC)1492110784 | ||
035 | |a (DE-599)BVBBV050040564 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Das, Ravindra |e Verfasser |0 (DE-588)1100570306 |4 aut | |
245 | 1 | 0 | |a Generative AI and digital forensics |c Ravindra Das |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press, Taylor & Francis Group |c 2025 | |
300 | |a ix, 101 Seiten |b Illustrationen |c 234 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Acknowledgements. Chapter 1: Security Breaches and Overview Into Digital Forensics. Chapter 2: Digital Forensics, Data Loss, and the SQL Server Database. Chapter 3: An Overview Into The SQL Injection Attack Chapter. 4: Conclusions – Using Generative AI In Digital Forensics. Index. | ||
520 | |a In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all. But even when a security breach does indeed happen, the immediate reaction is to contain it so that it does not penetrate further into the information technology/network infrastructure. From there, mission-critical processes need to be restored, until the business can resume a normal state of operations, like it was before the security breach.But another key step here is to investigate how and why the security breach happened in the first place. The best way to do this is through what is known as "digital forensics". This is where specially trained digital forensics investigators collect and comb through every piece of evidence to determine this. Eventually, the goal is then to use this evidence in a court of law so the cyberattacker can be made to answer for their crime and eventually be brought to justice.However, the area of digital forensics is a large one, and many topics around it can be covered. Also, generative AI is being used to not only help in the analysis of the evidence but also to help automate the digital forensics software packages that are available today. Therefore, in this book, the following is covered:- Examples of security breaches and overview of digital forensics.- How digital forensics can be used to investigate the loss or theft of data.- An introduction to the SQL Server Database.- A review of the SQL Injection Attack.- How generative AI can be used in digital forensics | ||
650 | 4 | |a bicssc / Artificial intelligence | |
650 | 4 | |a bicssc / Computer fraud & hacking | |
650 | 4 | |a bicssc / Coding theory & cryptology | |
650 | 4 | |a bicssc / Privacy & data protection | |
650 | 4 | |a bicssc / Legal aspects of IT | |
650 | 4 | |a bicssc / Computer architecture & logic design | |
650 | 4 | |a bicssc / Computer networking & communications | |
650 | 4 | |a bicssc / Security services | |
650 | 4 | |a bicssc / Criminology - legal aspects | |
650 | 4 | |a bicssc / Causes & prevention of crime | |
650 | 4 | |a bisacsh / COMPUTERS / Artificial Intelligence / General | |
650 | 4 | |a bisacsh / COMPUTERS / Security / Viruses & Malware | |
650 | 4 | |a bisacsh / LAW / Privacy | |
650 | 4 | |a bisacsh / COMPUTERS / Security / Network Security | |
650 | 4 | |a bisacsh / COMPUTERS / Security / General | |
650 | 4 | |a bisacsh / COMPUTERS / Internet / Online Safety & Privacy | |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-003-46943-8 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035378316 |
Datensatz im Suchindex
_version_ | 1823668227030384640 |
---|---|
adam_text | |
any_adam_object | |
author | Das, Ravindra |
author_GND | (DE-588)1100570306 |
author_facet | Das, Ravindra |
author_role | aut |
author_sort | Das, Ravindra |
author_variant | r d rd |
building | Verbundindex |
bvnumber | BV050040564 |
ctrlnum | (OCoLC)1492110784 (DE-599)BVBBV050040564 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV050040564</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250122</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241122s2025 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032742458</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-032-74245-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032744865</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-032-74486-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781032744865</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1492110784</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050040564</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Das, Ravindra</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1100570306</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Generative AI and digital forensics</subfield><subfield code="c">Ravindra Das</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">2025</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">ix, 101 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">234 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Acknowledgements. Chapter 1: Security Breaches and Overview Into Digital Forensics. Chapter 2: Digital Forensics, Data Loss, and the SQL Server Database. Chapter 3: An Overview Into The SQL Injection Attack Chapter. 4: Conclusions – Using Generative AI In Digital Forensics. Index. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all. But even when a security breach does indeed happen, the immediate reaction is to contain it so that it does not penetrate further into the information technology/network infrastructure. From there, mission-critical processes need to be restored, until the business can resume a normal state of operations, like it was before the security breach.But another key step here is to investigate how and why the security breach happened in the first place. The best way to do this is through what is known as "digital forensics". This is where specially trained digital forensics investigators collect and comb through every piece of evidence to determine this. Eventually, the goal is then to use this evidence in a court of law so the cyberattacker can be made to answer for their crime and eventually be brought to justice.However, the area of digital forensics is a large one, and many topics around it can be covered. Also, generative AI is being used to not only help in the analysis of the evidence but also to help automate the digital forensics software packages that are available today. Therefore, in this book, the following is covered:- Examples of security breaches and overview of digital forensics.- How digital forensics can be used to investigate the loss or theft of data.- An introduction to the SQL Server Database.- A review of the SQL Injection Attack.- How generative AI can be used in digital forensics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer fraud & hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Coding theory & cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Privacy & data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Legal aspects of IT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer architecture & logic design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer networking & communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Security services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Criminology - legal aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Causes & prevention of crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Artificial Intelligence / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / Viruses & Malware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / LAW / Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Internet / Online Safety & Privacy</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-003-46943-8</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035378316</subfield></datafield></record></collection> |
id | DE-604.BV050040564 |
illustrated | Illustrated |
indexdate | 2025-02-10T11:05:49Z |
institution | BVB |
isbn | 9781032742458 9781032744865 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035378316 |
oclc_num | 1492110784 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | ix, 101 Seiten Illustrationen 234 mm |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
spelling | Das, Ravindra Verfasser (DE-588)1100570306 aut Generative AI and digital forensics Ravindra Das Boca Raton ; London ; New York CRC Press, Taylor & Francis Group 2025 ix, 101 Seiten Illustrationen 234 mm txt rdacontent n rdamedia nc rdacarrier Acknowledgements. Chapter 1: Security Breaches and Overview Into Digital Forensics. Chapter 2: Digital Forensics, Data Loss, and the SQL Server Database. Chapter 3: An Overview Into The SQL Injection Attack Chapter. 4: Conclusions – Using Generative AI In Digital Forensics. Index. In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all. But even when a security breach does indeed happen, the immediate reaction is to contain it so that it does not penetrate further into the information technology/network infrastructure. From there, mission-critical processes need to be restored, until the business can resume a normal state of operations, like it was before the security breach.But another key step here is to investigate how and why the security breach happened in the first place. The best way to do this is through what is known as "digital forensics". This is where specially trained digital forensics investigators collect and comb through every piece of evidence to determine this. Eventually, the goal is then to use this evidence in a court of law so the cyberattacker can be made to answer for their crime and eventually be brought to justice.However, the area of digital forensics is a large one, and many topics around it can be covered. Also, generative AI is being used to not only help in the analysis of the evidence but also to help automate the digital forensics software packages that are available today. Therefore, in this book, the following is covered:- Examples of security breaches and overview of digital forensics.- How digital forensics can be used to investigate the loss or theft of data.- An introduction to the SQL Server Database.- A review of the SQL Injection Attack.- How generative AI can be used in digital forensics bicssc / Artificial intelligence bicssc / Computer fraud & hacking bicssc / Coding theory & cryptology bicssc / Privacy & data protection bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Security services bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Artificial Intelligence / General bisacsh / COMPUTERS / Security / Viruses & Malware bisacsh / LAW / Privacy bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Security / General bisacsh / COMPUTERS / Internet / Online Safety & Privacy Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Computerforensik (DE-588)4774034-6 s Künstliche Intelligenz (DE-588)4033447-8 s DE-604 Erscheint auch als Online-Ausgabe 978-1-003-46943-8 |
spellingShingle | Das, Ravindra Generative AI and digital forensics bicssc / Artificial intelligence bicssc / Computer fraud & hacking bicssc / Coding theory & cryptology bicssc / Privacy & data protection bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Security services bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Artificial Intelligence / General bisacsh / COMPUTERS / Security / Viruses & Malware bisacsh / LAW / Privacy bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Security / General bisacsh / COMPUTERS / Internet / Online Safety & Privacy Künstliche Intelligenz (DE-588)4033447-8 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4033447-8 (DE-588)4774034-6 |
title | Generative AI and digital forensics |
title_auth | Generative AI and digital forensics |
title_exact_search | Generative AI and digital forensics |
title_full | Generative AI and digital forensics Ravindra Das |
title_fullStr | Generative AI and digital forensics Ravindra Das |
title_full_unstemmed | Generative AI and digital forensics Ravindra Das |
title_short | Generative AI and digital forensics |
title_sort | generative ai and digital forensics |
topic | bicssc / Artificial intelligence bicssc / Computer fraud & hacking bicssc / Coding theory & cryptology bicssc / Privacy & data protection bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Security services bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Artificial Intelligence / General bisacsh / COMPUTERS / Security / Viruses & Malware bisacsh / LAW / Privacy bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Security / General bisacsh / COMPUTERS / Internet / Online Safety & Privacy Künstliche Intelligenz (DE-588)4033447-8 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | bicssc / Artificial intelligence bicssc / Computer fraud & hacking bicssc / Coding theory & cryptology bicssc / Privacy & data protection bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Security services bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Artificial Intelligence / General bisacsh / COMPUTERS / Security / Viruses & Malware bisacsh / LAW / Privacy bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Security / General bisacsh / COMPUTERS / Internet / Online Safety & Privacy Künstliche Intelligenz Computerforensik |
work_keys_str_mv | AT dasravindra generativeaianddigitalforensics |