Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Introduction to Data Analysis with R for Forensic Scientists (International Forensic Science and Investigation)
Introduction to Data Analysis with R for Forensic Scientists (International Forensic Science and Investigation)

Statistical methods provide a logical, coherent framework in which data from experimental science can be analyzed. However, many researchers lack the statistical skills or resources that would allow them to explore their data to its full potential. Introduction to Data Analysis with R for Forensic Sciences minimizes...

Forensic Science: Fundamentals and Investigations
Forensic Science: Fundamentals and Investigations
Finally, a textbook that provides the science behind forensics, as well as labs and activities appropriate for high school students! Forensic Science: Fundamentals and Investigations is student and teacher friendly. Teachers can conduct a full-year’s study of forensics or select topics that can be incorporated into a...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
Whether monitoring the Internet for threats and chatter, capturing computer evidence, or crunching forensic data, Guidance Software's EnCase computer forensics software is recognized as the premier computer forensics tool on the market. For investigation professionals, EnCE certification tells the world that you've not only mastered the use of...
Instant Wireshark Starter
Instant Wireshark Starter

Wireshark is by far the most popular network traffic analyzing tool.

It not only provides an interface for traffic capture but also provides a rich platform for an in-depth analysis of the traffic. The GUI provides a very user friendly and interactive media that simplifies the process of network forensics. This concise book...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Expert C# 5.0: with the .NET 4.5 Framework (Expert Apress)
Expert C# 5.0: with the .NET 4.5 Framework (Expert Apress)

Expert C# 5.0 is a book about getting the best from C#. It’s based on the principle that to write good, high-performance, robust applications you need to understand whats going on deep under the hood. If you are already experienced with writing managed applications and want to learn more about how to get the best from the ...

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

Water-Related Death Investigation: Practical Methods and Forensic Applications
Water-Related Death Investigation: Practical Methods and Forensic Applications

All too often, police called to the scene of a water-related death may consider it an accidental drowning before they even arrive. But the investigation of these types of deaths requires the same careful and thorough documentation as in other potentially non-natural deaths and these efforts must be carried through all stages of investigation....

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy