Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)

Data mining has developed rapidly and has become very popular in the past two decades, but actually has its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases. The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In corporate...

File System Forensic Analysis
File System Forensic Analysis
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier...
Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Flask By Example
Flask By Example

Unleash the full potential of the Flask web framework by creating simple yet powerful web applications

About This Book

  • The most up-to-date book on Flask on the market
  • Create your own world-class applications and master the art of Flask by unravelling its enigma through this journey
  • ...
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
Geographic Profiling
Geographic Profiling
Scientific criminology has its roots in crime mapping. The first great systematic studies of crime were cartographic exercises made possible by recordkeeping systems created to track criminal convictions in France and England during the early part of the 19th century. Compared with maps of demographic, economic, and social...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Electronic Crime Scene Investigation
Electronic Crime Scene Investigation

This book is intended to assist State and local law enforcement and other first responders who may be responsible for preserving an electronic crime scene and for recognising, collecting, and safeguarding digital evidence. It is not all inclusive but addresses situations encountered with electronic crime scenes and digital evidence. All crime...

Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities
Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities

Computer and Machine Vision: Theory, Algorithms, Practicalities (previously entitled Machine Vision) clearly and systematically presents the basic methodology of computer and machine vision, covering the essential elements of the theory while emphasizing algorithmic and practical design constraints. This fully revised fourth edition has...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy