Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

MVVM Survival Guide for Enterprise Architectures in Silverlight and WPF
MVVM Survival Guide for Enterprise Architectures in Silverlight and WPF
Rich client development remains one of the most popular forms of application development, both from a user and a developer point of view. While nobody denies the importance of thin-client interface technologies such as HTML(5), it is clear that consumers and enterprises alike enjoy using applications that provide a rich,...
Enacted Personal Professional Learning: Re-thinking Teacher Expertise with Story-telling and Problematics
Enacted Personal Professional Learning: Re-thinking Teacher Expertise with Story-telling and Problematics
This book offers a vital new approach to teacher professional learning, drawing on teachers’ stories from the field. It investigates expert teachers’ professional learning and uses a narrative framework to analyse their meaning-making processes. The book focuses on how proficient teachers develop their expertise,...
Pharmacy Informatics
Pharmacy Informatics

Applies the Principles of Informatics to the Pharmacy Profession
Emphasizes Evidence-Based Practice and Quality Improvement Approaches

Leading the way in the integration of information technology with healthcare, Pharmacy Informatics reflects some of the rapid changes that have developed in...

Think Bayes
Think Bayes

If you know how to program with Python and also know a little about probability, you’re ready to tackle Bayesian statistics. With this book, you'll learn how to solve statistical problems with Python code instead of mathematical notation, and use discrete probability distributions instead of continuous mathematics. Once you...

Bioarchaeologists Speak Out (Bioarchaeology and Social Theory)
Bioarchaeologists Speak Out (Bioarchaeology and Social Theory)

Bioarchaeologists who study human remains in ancient, historic and contemporary settings are securely anchored within anthropology as anthropologists, yet they have not taken on the pundits the way other subdisciplines within anthropology have. Popular science authors frequently and selectively use bioarchaeological data on...

The Innovation and Evolution of Medical Devices: Vaginal Mesh Kits
The Innovation and Evolution of Medical Devices: Vaginal Mesh Kits
This text provides a central resource for physicians, entrepreneurs, and the MBA students about how innovation occurs in medical device industry.  The book uses the rise and fall of vaginal mesh kits to highlight the evolution of responses by the physicians, patients and the regulatory bodies.  There are specific chapters...
Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Evidence-Based Practice in Perioperative Cardiac Anesthesia and Surgery
Evidence-Based Practice in Perioperative Cardiac Anesthesia and Surgery

This comprehensive yet concise book addresses current best practice in the combined areas of cardiac surgery and anesthesia, interventional minimally invasive cardiac procedures, perioperative management and monitoring, and critical care recovery. This book not only provides the latest best practices in the perioperative management...

Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy