Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Forensics: A workbench for inventing and sharing digital forensic technology
Python Forensics: A workbench for inventing and sharing digital forensic technology

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build...

Understanding Biotechnology
Understanding Biotechnology

An objective, thorough, and accessible introduction to biotechnology.

Biotechnology will have an increasingly profound impact on human health, agriculture, the environment, and society itself. Understanding Biotechnology offers an introduction to biotechnology that is balanced, accurate, current, thorough,...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Bayesian Networks: A Practical Guide to Applications (Statistics in Practice)
Bayesian Networks: A Practical Guide to Applications (Statistics in Practice)

Bayesian Networks, the result of the convergence of artificial intelligence with statistics, are growing in popularity. Their versatility and modelling power is now employed across a variety of fields for the purposes of analysis, simulation, prediction and diagnosis.

This book provides a general introduction to Bayesian networks,...

Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.

This unique collection details how to
...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Forensic Science: Fundamentals and Investigations
Forensic Science: Fundamentals and Investigations
Finally, a textbook that provides the science behind forensics, as well as labs and activities appropriate for high school students! Forensic Science: Fundamentals and Investigations is student and teacher friendly. Teachers can conduct a full-year’s study of forensics or select topics that can be incorporated into a...
Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy