Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

Cyber Crime Investigator's Field Guide
Cyber Crime Investigator's Field Guide
Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to...
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

You've just gotta love Ubuntu; it's an irresistible package of usability, security, and support features. But a power user like you is just itching to teach it some new tricks. Show it how to play nicely with other systems. Develop its multitasking and communication skills. Free its inner video and graphics talents. And make sure that when it...

Herbal Products: Toxicology and Clinical Pharmacology (Forensic Science and Medicine)
Herbal Products: Toxicology and Clinical Pharmacology (Forensic Science and Medicine)

Herbal Products: Toxicology and Clinical Pharmacology, Second Edition builds on the informative foundation laid by its predecessor. This fully revised and expanded second edition boasts more than 200 new references that document efficacy studies and adverse effects and four new chapters devoted to dietary products. Practitioners and...

Windows Forensic Analysis DVD Toolkit
Windows Forensic Analysis DVD Toolkit
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and...
The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition
The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition
Pass the CISSP and ISSEP exams with this new edition of the bestselling prep guide!

The U.S. government has mandated that all contractors–nearly all current CISSPs, and those yet to be certified as CISSPs–attain the security engineering subject certification Information Systems Security Engineering Professional (ISSEP). The ISSEP...

Dictionary of Information Security
Dictionary of Information Security

IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification...

Computer Forensics For Dummies (Computer/Tech)
Computer Forensics For Dummies (Computer/Tech)
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master...
Infrared and Raman Spectroscopy in Forensic Science
Infrared and Raman Spectroscopy in Forensic Science

This book will provide a survey of the major areas in which information derived from vibrational spectroscopy investigations and studies have contributed to the benefit of forensic science, either in a complementary or a unique way. This is highlighted by examples taken from real case studies and analyses of forensic relevance, which provide...

Honeypots for Windows (The Experts Voice)
Honeypots for Windows (The Experts Voice)

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journey—helping you set up...

Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Does the gunshot residue reveal how far from the target a weapon was fired? Is there any trace evidence to prove the accused handled a specific firearm? What is the likely behaviour of a ricocheting bullet? Do the marks on a bullet prove categorically that it was fired from a particular weapon? These are all issues (amongst others) that the fully...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy