Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Contrast Data Mining: Concepts, Algorithms, and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Contrast Data Mining: Concepts, Algorithms, and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

A Fruitful Field for Researching Data Mining Methodology and for Solving Real-Life Problems
Contrast Data Mining: Concepts, Algorithms, and Applications collects recent results from this specialized area of data mining that have previously been scattered in the literature, making them more accessible to
...

Intelligent Multimedia Surveillance: Current Trends and Research
Intelligent Multimedia Surveillance: Current Trends and Research

Intelligent multimedia surveillance concerns the analysis of multiple sensing inputs including video and audio streams, radio-frequency identification (RFID), and depth data. These data are processed for the automated detection and tracking of people, vehicles, and other objects. The goal is to locate moving targets, to understand their...

Mastering Java Machine Learning: Mastering and implementing advanced techniques in machine learning
Mastering Java Machine Learning: Mastering and implementing advanced techniques in machine learning

Become an advanced practitioner with this progressive set of master classes on application-oriented machine learning

About This Book

  • Comprehensive coverage of key topics in machine learning with an emphasis on both the theoretical and practical aspects
  • More than 15 open source Java tools...
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

No Middle Name: The Complete Collected Jack Reacher Short Stories
No Middle Name: The Complete Collected Jack Reacher Short Stories

NEW YORK TIMES BESTSELLER • Get ready for the ultimate Jack Reacher experience: a thrilling new novella and eleven previously published stories, together for the first time in one pulse-pounding collection from Lee Child.

No Middle Name begins with “Too Much Time,” a brand-new work of
...

DarkMarket: Cyberthieves, Cybercops and You
DarkMarket: Cyberthieves, Cybercops and You

"This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime. Essential reading." --Roberto Saviano, author of Gommorah

The benefits of living in a digital, globalized society are enormous; so too are the dangers. The world has become a
...

Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)
Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)

In this revised and expanded edition, leading forensic scientist John Trestrail offers a pioneering survey of all that is known about the use of poison as a weapon in murder. Topics range from the use of poisons in history and literature to convicting the poisoner in court, and include a review of the different types of poisons, techniques...

Women Drug Traffickers: Mules, Bosses, and Organized Crime (Diálogos Series)
Women Drug Traffickers: Mules, Bosses, and Organized Crime (Diálogos Series)

In the flow of drugs to the United States from Latin America, women have always played key roles as bosses, business partners, money launderers, confidantes, and couriers―work rarely acknowledged. Elaine Carey’s study of women in the drug trade offers a new understanding of this intriguing subject, from women drug smugglers in the...

Warranty Fraud Management: Reducing Fraud and Other Excess Costs in Warranty and Service Operations (Wiley and SAS Business Series)
Warranty Fraud Management: Reducing Fraud and Other Excess Costs in Warranty and Service Operations (Wiley and SAS Business Series)

Cut warranty costs by reducing fraud with transparent processes and balanced control

Warranty Fraud Management provides a clear, practical framework for reducing fraudulent warranty claims and other excess costs in warranty and service operations. Packed with actionable guidelines and detailed information, this book...

The Lost Boyz: A Dark Side of Graffiti
The Lost Boyz: A Dark Side of Graffiti

At age 14, author Justin Rollins went from being a bullied child to the leader of The Warriorz, a group of London street kids involved in graffiti tagging and other crimes, including a series of violent encounters. Eventually given a substantial custodial sentence for an attack with a meat cleaver in the London Underground, Rollins became...

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy