Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Design of Rotating Electrical Machines
Design of Rotating Electrical Machines

Translated from the original Finnish material by Hanna Niemelä, Lappeenranta University of Technology, Finland

In one complete volume, this essential reference presents an in-depth overview of the theoretical principles and techniques of electrical machine design. This book enables you to design...

Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has
The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has

Not everything that you might think is unfair in the workplace is actually illegal.

In order to fully protect your rights, you must understand them first. The Employee Answer Book, the latest addition to the Answer Book Series, answers real questions from real people. This book discusses federal employment law in detail and touches...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Neighbor Law: Fences, Trees, Boundaries and Noise
Neighbor Law: Fences, Trees, Boundaries and Noise
The world is full of barking dogs and trespassing trees, spite fences and 2 a.m. rock fests, but your neighbor's lack of consideration needn't be your lifelong headache. The Nolo Press guide to Neighbor Law, eruditely and accessibly written by attorney Cora Jordan, explains all the laws relevant to noise, obstructed views, and...
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection

This book is generally about software intellectual property and specifically about the field of software forensics. While you may never testify in a courtroom, attempt to deduce the true owner of a valuable program, or measure the intellectual property (IP) value of software source code, if you are at all involved with software you...

Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators
Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators

The First Practical Guide to the Use of Photoshop in Forensics Investigations

This timely book is the first to take the forensic use of digital imaging out of the classroom and into the real world for law enforcement, legal, and other forensics professionals. How do you show the exact position or...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy