Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective
Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective

Comprehensive and user friendly, this book synthesizes the growing literature on symptom feigning in cognitive testing and translates it into evidence-based recommendations for clinical and forensic practice. A wide range of cognitive effort assessment techniques and strategies are critically...

Forensic Emergency Medicine (Board Review Series)
Forensic Emergency Medicine (Board Review Series)

Updated for its Second Edition, this text provides the information emergency departments need about the medicolegal aspects of treating victims of violence, motor vehicle accidents, sexual assault, child abuse, elder abuse, and intimate partner abuse. It offers detailed guidelines on interviewing and examining the victim and...

Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Looseleaf for Criminal Investigation
Looseleaf for Criminal Investigation
Swanson's Criminal Investigation, Twelfth Edition, is widely recognized as the most accurate and comprehensive text in the field. This practical, step-by-step introduction to criminal investigation gives students a logical framework for understanding the investigative process. Major sections cover current issues, such as...
Textile Fiber Microscopy: A Practical Approach
Textile Fiber Microscopy: A Practical Approach

A groundbreaking text to the study of textile fibers that bridges the knowledge gap between fiber shape and end uses

Textile Fiber Microscopy offers an important and comprehensive guide to the study of textile fibers and contains a unique text that prioritizes a review of fibers’ microstructure,...

Forensic Human Factors and Ergonomics: Case Studies and Analyses
Forensic Human Factors and Ergonomics: Case Studies and Analyses

This book has 18 case study chapters investigating various injury scenarios through the use of a Human Factors and Ergonomics (HFE) analysis. Each injury scenario derives from one or more similar lawsuits (but names, places and some of the details are fictionalized). The scenarios describe a ‘slice of life’ of people...

Memory Management: Algorithms and Implementation in C/C++
Memory Management: Algorithms and Implementation in C/C++

This book is different. Very different.

In this book, I am going to pull the curtain back and let you see the little man operating the switches and pulleys. You may be excited by what you see, or you may feel sorry that you decided to look. But as Enrico Fermi would agree, knowledge is always better than...

Honeypots for Windows (The Experts Voice)
Honeypots for Windows (The Experts Voice)

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journey—helping you set up...

Digital Evidence and Computer Crime, Second Edition
Digital Evidence and Computer Crime, Second Edition

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.

Though an...

Computer Forensics JumpStart
Computer Forensics JumpStart

Launch Your Career in Computer Forensics—Quickly and Effectively

Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field:

  • Conducting a computer forensics investigation
  • ...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy