Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Forensic Analysis DVD Toolkit, Second Edition
Windows Forensic Analysis DVD Toolkit, Second Edition

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior
...

Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan
Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan

This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the International Workshop on Computational Forensics (IWCF 2010), held in Tokyo, Japan during November 11–12, 2010. The workshop took place in conjunction with the 16th Annual Scientific Meeting of the Japanese Association of Forensic Science.

...
Forensic Engineering: Damage Assessments for Residential and Commercial Structures
Forensic Engineering: Damage Assessments for Residential and Commercial Structures

A comprehensive resource that builds a bridge between engineering disciplines and the building sciences and trades, Forensic Engineering: Damage Assessments for Residential and Commercial Structures provides an extensive look into the world of forensic engineering. With a focus on investigations associated with insurance industry...

Real Crime Scene Investigations: Forensic Experts Reveal Their Secrets
Real Crime Scene Investigations: Forensic Experts Reveal Their Secrets
‘It’s not CSI.’ A few years ago, as forensic crime shows started splashing across TV screens like so much blood spatter, I started hearing this from cops I know in my family and their friends. I heard it from homicide detectives I’d interviewed for previous books. The cops always stopped, sort of mysteriously, at this...
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic...

Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
Illustrated Guide to Home Forensic Science Experiments: All Lab, No Lecture (Diy Science)
Illustrated Guide to Home Forensic Science Experiments: All Lab, No Lecture (Diy Science)

Have you ever wondered whether the forensic science you’ve seen on TV is anything like the real thing? There’s no better way to find out than to roll up your sleeves and do it yourself. This full-color book offers advice for setting up an inexpensive home lab, and includes more than 50 hands-on lab sessions that deal with...

The Routledge Handbook of the Philosophy and Science of Punishment (Routledge Handbooks in Philosophy)
The Routledge Handbook of the Philosophy and Science of Punishment (Routledge Handbooks in Philosophy)

Philosophers, legal scholars, criminologists, psychiatrists, and psychologists have long asked important questions about punishment: What is its purpose? What theories help us better understand its nature? Is punishment just? Are there effective alternatives to punishment? How can empirical data from the sciences help us better...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy