Home | Amazing | Today | Tags | Publishers | Years | Search 
CISSP Exam Cram 2
CISSP Exam Cram 2

Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during...

A Textbook of Modern Toxicology
A Textbook of Modern Toxicology
A state-of-the-art toxicology textbook—ideal for students and professionals

Toxicology is a multifaceted field that encompasses the physical and chemical study of all known poisonous substances. It involves the rigorous analysis of toxicants and their effects on living tissues, forensic toxicology, quality assurance...

Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Investigating Child Exploitation: The Internet, Law and Forensic Science
Investigating Child Exploitation: The Internet, Law and Forensic Science
This work is the culmination of many years of study and work. During my undergraduate
and graduate work, my primary research interests revolved around
domestic violence, sexual assault, child abuse, and child exploitation. Feminism,
the Constitution, freedom of expression and privacy, politics, and the
dynamics of power are
...
Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

Understanding Biotechnology
Understanding Biotechnology

An objective, thorough, and accessible introduction to biotechnology.

Biotechnology will have an increasingly profound impact on human health, agriculture, the environment, and society itself. Understanding Biotechnology offers an introduction to biotechnology that is balanced, accurate, current, thorough,...

Memory Management: Algorithms and Implementation in C/C++
Memory Management: Algorithms and Implementation in C/C++

This book is different. Very different.

In this book, I am going to pull the curtain back and let you see the little man operating the switches and pulleys. You may be excited by what you see, or you may feel sorry that you decided to look. But as Enrico Fermi would agree, knowledge is always better than...

Looseleaf for Criminal Investigation
Looseleaf for Criminal Investigation
Swanson's Criminal Investigation, Twelfth Edition, is widely recognized as the most accurate and comprehensive text in the field. This practical, step-by-step introduction to criminal investigation gives students a logical framework for understanding the investigative process. Major sections cover current issues, such as...
Textile Fiber Microscopy: A Practical Approach
Textile Fiber Microscopy: A Practical Approach

A groundbreaking text to the study of textile fibers that bridges the knowledge gap between fiber shape and end uses

Textile Fiber Microscopy offers an important and comprehensive guide to the study of textile fibers and contains a unique text that prioritizes a review of fibers’ microstructure,...

Forensic Human Factors and Ergonomics: Case Studies and Analyses
Forensic Human Factors and Ergonomics: Case Studies and Analyses

This book has 18 case study chapters investigating various injury scenarios through the use of a Human Factors and Ergonomics (HFE) analysis. Each injury scenario derives from one or more similar lawsuits (but names, places and some of the details are fictionalized). The scenarios describe a ‘slice of life’ of people...

Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)
Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)
Moore explains the difficulties in applying traditional Fourth Amendment jurisprudence several of the more common warrantless search doctrines, in order to determine what aspects of traditional search and seizure doctrine apply to crimes involving technology. To amplify his points, he discusses several high technology crimes. Additionally, he...
Honeypots for Windows (The Experts Voice)
Honeypots for Windows (The Experts Voice)

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journey—helping you set up...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy