Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

Encyclopedia of Forensic Sciences, Three-Volume Set
Encyclopedia of Forensic Sciences, Three-Volume Set
The Encyclopedia of Forensic Sciences is the first resource to provide comprehensive coverage of the core theories, methods, techniques, and applications employed by forensic scientists. One of the more pressing concerns in forensic science is the collection of evidence from the crime scene and its relevance to the forensic...
Brain Imaging in Substance Abuse: Research, Clinical, and Forensic Applications (Forensic Science and Medicine)
Brain Imaging in Substance Abuse: Research, Clinical, and Forensic Applications (Forensic Science and Medicine)

The last two decades have seen prodigious growth in the application of brain imaging methods to questions of substance abuse and addiction. Despite considerable advances in our understanding of the central effects of drugs provided by preclinical data, relatively little direct evidence was known of how substances of abuse affect the brain and...

Neurocriminology: Forensic and Legal Applications, Public Policy Implications
Neurocriminology: Forensic and Legal Applications, Public Policy Implications

Neurocriminology: Forensic and Legal Applications, Public Policy Implications explores the dramatic impact of advances in neuroscience research and practice to our present understanding of criminality and crime control. Contemporary, cutting-edge research in neuroscience is cited and explained. Studies and cases are clearly...

Faulk's Basic Forensic Psychiatry
Faulk's Basic Forensic Psychiatry

After the second edition was published (in 1994), a number of changes have taken place, including changes in the law, advances in treatment, and changes in the management of prisons and special hospitals.

The book remains essential reading for doctors taking the Membership examination of the Royal College of Psychiatrists, but also...

Cloud Storage Forensics
Cloud Storage Forensics

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the...

Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
CompTIA Security+ All-in-One Exam Guide, Second Edition
CompTIA Security+ All-in-One Exam Guide, Second Edition

A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of...

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy