Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
File System Forensic Analysis
File System Forensic Analysis
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier...
Unix Unleashed/Book and CD
Unix Unleashed/Book and CD
Given life by Turing Award winning Bell Labs computer scientist Ken Thompson at Murray Hill, N.J., in August 1969, UNIX spent its early years as a research curiosity. When I met up with Unix in the summer of '82, however, it already possessed the one characteristic that destined it to dominate a major chunk of the world's market for operating...
Platinum Edition Using Microsoft Windows XP
Platinum Edition Using Microsoft Windows XP
While most Windows books concentrate on a ground floor approach, Platinum Edition Using Microsoft Windows XP takes an entirely different approach - one that assumes the reader is a bona fide Windows black belt who wants or needs to manage multiple users in a networked environment, turbocharge a Windows installation with registry tweaks or stop...
Dynamical Systems and Fractals: Computer Graphics Experiments with Pascal
Dynamical Systems and Fractals: Computer Graphics Experiments with Pascal
This study of chaos, fractals and complex dynamics is intended for anyone familiar with computers. While keeping the mathematics to a simple level with few formulas, the reader is introduced to an area of current scientific research that was scarcely possible until the availability of computers. The book is divided into two main parts; the...
Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Learning the Korn Shell (2nd Edition)
Learning the Korn Shell (2nd Edition)

The Korn shell is an interactive command and scripting language for accessing Unix® and other computer systems. As a complete and high-level programming language in itself, it's been a favorite since it was developed in the mid 1980s by David G. Korn at AT&T Bell Laboratories. Knowing how to use it is an essential skill for...

The Technical and Social History of Software Engineering
The Technical and Social History of Software Engineering

“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, its long and fascinating history....

Argus Developer in Practice: Real Estate Development Modeling in the Real World
Argus Developer in Practice: Real Estate Development Modeling in the Real World

This book is a practical guide to using Argus Developer, the world’s most widely used real estate development feasibility modeling software. Using practical examples and many case studies, it takes readers beyond basic training and provides the in-depth knowledge required to analyze potential real estate deals and help ensure a...

Treating Drug Problems
Treating Drug Problems
“This volume on drug problems is excellent…powerful and compelling…” (PsycCRITIQUES, 8th February 2005)

"...a lot of useful information..." (Addiction, June 2006)

Part of the new Treating Addictions series, Treating Drug Problems is full of practical information on
...

JUNOS High Availability: Best Practices for High Network Uptime (Animal Guide)
JUNOS High Availability: Best Practices for High Network Uptime (Animal Guide)

Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management,...

Word 2010 Simplified
Word 2010 Simplified

Simply the easiest way yet to get up to speed on Word 2010

Microsoft Word 2010 includes all sorts of new features and functionalities, a redesigned interface, new emphasis on collaboration, and many additional changes. Both users of previous editions and those new to the Office applications will appreciate the clear, visual...

Laptops For Dummies (Computer/Tech)
Laptops For Dummies (Computer/Tech)
Choose the right laptop, set it up, and hit the road!

Decide what you want your laptop to do,use all its features, and solve problems

Here's the best advice ever to fall into your lap. From how to unpack the box (yes, it DOES matter!) to being selective about software, managing your power, and protecting your connection, this...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy