Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Facebook and Philosophy: What's on Your Mind? (Popular Culture and Philosophy)
Facebook and Philosophy: What's on Your Mind? (Popular Culture and Philosophy)
Facebook and Philosophy is an entertaining, multi-faceted exploration of what Facebook means for us and for our relationships. With discussions ranging from the nature of friendship and its relationship to "friending," to the (debatable) efficacy of "online activism," this book is the most extensive and systematic...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Bayesian Argumentation: The practical side of probability (Synthese Library)
Bayesian Argumentation: The practical side of probability (Synthese Library)

Relevant to, and drawing from, a range of disciplines, the chapters in this collection show the diversity, and applicability, of research in Bayesian argumentation. Together, they form a challenge to philosophers versed in both the use and criticism of Bayesian models who have largely overlooked their potential in argumentation. Selected from...

The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Practical Digital Forensics
Practical Digital Forensics

Get started with the art and science of digital forensics with this practical, hands-on guide!

About This Book

  • Champion the skills of digital forensics by understanding the nature of recovering and preserving digital information which is essential for legal or disciplinary proceedings
  • ...
The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has
The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has

Not everything that you might think is unfair in the workplace is actually illegal.

In order to fully protect your rights, you must understand them first. The Employee Answer Book, the latest addition to the Answer Book Series, answers real questions from real people. This book discusses federal employment law in detail and touches...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Neighbor Law: Fences, Trees, Boundaries and Noise
Neighbor Law: Fences, Trees, Boundaries and Noise
The world is full of barking dogs and trespassing trees, spite fences and 2 a.m. rock fests, but your neighbor's lack of consideration needn't be your lifelong headache. The Nolo Press guide to Neighbor Law, eruditely and accessibly written by attorney Cora Jordan, explains all the laws relevant to noise, obstructed views, and...
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection

This book is generally about software intellectual property and specifically about the field of software forensics. While you may never testify in a courtroom, attempt to deduce the true owner of a valuable program, or measure the intellectual property (IP) value of software source code, if you are at all involved with software you...

Result Page: 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy