Home | Amazing | Today | Tags | Publishers | Years | Search 
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
I have thought long and hard about this book. This book was not created to make money. It was created to save lives — the lives of first responders and the people they have dedicated their lives to protect, the general public.

What is a first responder? It is a phrase often mentioned in the press but rarely defined.
...
Encyclopedia of Medical Genomics and Proteomics 2 vol. set
Encyclopedia of Medical Genomics and Proteomics 2 vol. set

Updating researchers on phenomenal progress in the field of molecular medicine the Encyclopedia of Medical Genomics and Proteomics offers trail-blazing studies and authoritative contributions from more than 400 specialists. An important and timely contribution to the biomedical community, the encyclopedia compiles...

Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Learning iOS Security
Learning iOS Security

Enhance the security of your iOS platform and applications using iOS-centric security techniques

About This Book

  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS...
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

Ultrawideband Radar: Applications and Design
Ultrawideband Radar: Applications and Design

Providing a practical review of the latest technology in the field, Ultrawideband Radar Applications and Design presents cutting-edge advances in theory, design, and practical applications of ultrawideband (UWB) radar. This book features contributions from an international team of experts to help readers learn about a wide range...

Faulk's Basic Forensic Psychiatry
Faulk's Basic Forensic Psychiatry

After the second edition was published (in 1994), a number of changes have taken place, including changes in the law, advances in treatment, and changes in the management of prisons and special hospitals.

The book remains essential reading for doctors taking the Membership examination of the Royal College of Psychiatrists, but also...

Principles of Data Mining (Undergraduate Topics in Computer Science)
Principles of Data Mining (Undergraduate Topics in Computer Science)

Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each...

Dictionary of DNA and Genome Technology
Dictionary of DNA and Genome Technology

DNA technology is evolving rapidly, with new methods and a fast-growing vocabulary. This unique dictionary offers current, detailed and accessible information on DNA technology to lecturers, researchers and students throughout the biomedical and related sciences.

The third edition is a major update, with over 3000 references from...

What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be protected by security guards, cipher locks, and an ID badge worn by all employees. As the computing paradigm is continually changing with shared resources and mobility, firewalls and antivirus software are also not enough to protect critical assets. This...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy