Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Scene of the Cybercrime: Computer Forensics Handbook
Scene of the Cybercrime: Computer Forensics Handbook

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and
...

Windows Forensics: The Field Guide for Corporate Computer Investigations
Windows Forensics: The Field Guide for Corporate Computer Investigations

The evidence is in--to solve Windows crime, you need Windows tools

An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime.

Whether...

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem

Philosophers of science have long used reconstructive reasoning to develop historical explanations covering the origins of natural phenomenon. The application of the scientific method is a powerful tool for solving crimes through reconstruction of the events. Scientific Foundations of Crime Scene Reconstruction: Introducing Method to...

A Textbook of Modern Toxicology
A Textbook of Modern Toxicology
A state-of-the-art toxicology textbook—ideal for students and professionals

Toxicology is a multifaceted field that encompasses the physical and chemical study of all known poisonous substances. It involves the rigorous analysis of toxicants and their effects on living tissues, forensic toxicology, quality assurance...

Poisoning & Drug Overdose (Lange Clinical Manual)
Poisoning & Drug Overdose (Lange Clinical Manual)
This is the leading manual on the diagnosis and treatment of poisoning and drug overdose, including chemical and occupational exposures.

Univ. of California, San Francisco. Quick-reference pocket manual for practitioners in emergency settings. Outline format and thumb tabbed. Previous edition: c1994. Wire-spiral binding.
...
Guide to Neuropsychiatric Therapeutics
Guide to Neuropsychiatric Therapeutics

Written primarily by Fellows of the American Neuropsychiatric Association, this handbook offers practical, explicit, evidence-based guidelines for diagnosis and treatment of neuropsychiatric disorders. Concise, clinically oriented chapters cover all psychiatric and behavioral disorders associated with brain dysfunction. Each chapter...

Criminal Psychology and Forensic Technology: A Collaborative Approach to Effective Profiling
Criminal Psychology and Forensic Technology: A Collaborative Approach to Effective Profiling
Offender profiling has been developing slowly as a possible investigative tool since 1841 and the publication of Edgar Allen Poe's The Murder in the Rue Morgue. In this book, detective C. Auguste Dupin demonstrates the ability to follow the thought patterns of a companion while they stroll through Paris for 15 minutes without speaking a word. Today...
Computer Forensics JumpStart
Computer Forensics JumpStart

Launch Your Career in Computer Forensics—Quickly and Effectively

Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field:

  • Conducting a computer forensics investigation
  • ...
The Facts On File Dictionary Of Mathematics (Facts on File Science Library)
The Facts On File Dictionary Of Mathematics (Facts on File Science Library)
This dictionary is one of a series designed for use in schools. It is intended for students of mathematics, but we hope that it will also be helpful to other science students and to anyone interested in science. Facts On File also publishes dictionaries in a variety of disciplines, including biology, chemistry, forensic science, marine science,...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy