Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Never Threaten to Eat Your Co-Workers: Best of Blogs
Never Threaten to Eat Your Co-Workers: Best of Blogs

Do you occasionally wonder,

  • What kind of person works at a porn video store?
  • Do public defenders believe in their clients?
  • What does a reporter feel when he visits war-torn Iraq?
  • What happens after a child star falls into obscurity?

Thanks to Web logs, or...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Acres of Skin: Human Experiments at Holmesburg Prison
Acres of Skin: Human Experiments at Holmesburg Prison
In the first expose of unjust medical experimentation since David Rothman's Willowbrook's Wars, Allen M. Hornblum releases devastating stories from within the walls of Philadelphia's Holmesburg Prison. For more than two decades, from the mid-1950s through the mid-1970s, inmates were used, in exchange for a few dollars, as guinea pigs...
Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

American Criminal Courts: Legal Process and Social Context
American Criminal Courts: Legal Process and Social Context

American Criminal Courts: Legal Process and Social Context provides a complete picture of both the theory and day-to-day reality of criminal courts in the United States. The book begins by exploring how democratic processes affect criminal law, the documents that define law, the organizational structure of courts at the federal...

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
Clinical Forensic Medicine: A Physician's Guide (Forensic Science and Medicine)
Clinical Forensic Medicine: A Physician's Guide (Forensic Science and Medicine)

This revised edition has been completely updated and expanded to address the latest developments and professional concerns in forensic medicine. There are new chapters on the medical aspects of police restraint and new material on the potential of police exposure to infection, the role of alcohol and drugs in vehicular accidents, and forensic...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy