Home | Amazing | Today | Tags | Publishers | Years | Search 
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators...

Learning iOS Security
Learning iOS Security

Enhance the security of your iOS platform and applications using iOS-centric security techniques

About This Book

  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS...
Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

And Every Word Is True: Newfound evidence reveals Truman Capote's
And Every Word Is True: Newfound evidence reveals Truman Capote's
Truman Capote’s bestselling book “In Cold Blood” has captivated worldwide audiences for over fifty years. It is a gripping story about the consequences of a trivial robbery gone terribly wrong in a remote village of western Kansas.But what if robbery was not the motive at all, but something more sinister? And why would the...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Biological Anthropology of the Human Skeleton
Biological Anthropology of the Human Skeleton

An Indispensable Resource on Advanced Methods of Analysis of Human Skeletal and Dental Remains in Archaeological and Forensic Contexts

Now in its third edition, Biological Anthropology of the Human Skeleton has become a key reference for bioarchaeologists, human osteologists, and paleopathologists...

The Routledge Handbook of the Philosophy and Science of Punishment (Routledge Handbooks in Philosophy)
The Routledge Handbook of the Philosophy and Science of Punishment (Routledge Handbooks in Philosophy)

Philosophers, legal scholars, criminologists, psychiatrists, and psychologists have long asked important questions about punishment: What is its purpose? What theories help us better understand its nature? Is punishment just? Are there effective alternatives to punishment? How can empirical data from the sciences help us better...

The Science of Hate: How prejudice becomes hate and what we can do to stop it
The Science of Hate: How prejudice becomes hate and what we can do to stop it

Why do people commit hate crimes? A world-leading criminologist explores the tipping point between prejudice and hate crime, analysing human behaviour across the globe and throughout history in this vital book.

'Utterly brilliant . . . powerful . . . From personal histories to broader social
...

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy