Home | Amazing | Today | Tags | Publishers | Years | Search 
Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

When Law and Medicine Meet: A Cultural View (International Library of Ethics, Law, and the New Medicine)
When Law and Medicine Meet: A Cultural View (International Library of Ethics, Law, and the New Medicine)

What happens when two systems, law and medicine, are joined in the arena of the court? This work deals with the structure and the premises of two diverse discourse models; the approach is anthropological.

Several chapters are preponderantly based on legal research, addressing cases requiring testimony by expert witnesses on recent...

Brain Imaging in Substance Abuse: Research, Clinical, and Forensic Applications (Forensic Science and Medicine)
Brain Imaging in Substance Abuse: Research, Clinical, and Forensic Applications (Forensic Science and Medicine)

The last two decades have seen prodigious growth in the application of brain imaging methods to questions of substance abuse and addiction. Despite considerable advances in our understanding of the central effects of drugs provided by preclinical data, relatively little direct evidence was known of how substances of abuse affect the brain and...

Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem

Philosophers of science have long used reconstructive reasoning to develop historical explanations covering the origins of natural phenomenon. The application of the scientific method is a powerful tool for solving crimes through reconstruction of the events. Scientific Foundations of Crime Scene Reconstruction: Introducing Method to...

Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective
Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective

Comprehensive and user friendly, this book synthesizes the growing literature on symptom feigning in cognitive testing and translates it into evidence-based recommendations for clinical and forensic practice. A wide range of cognitive effort assessment techniques and strategies are critically...

Forensic Emergency Medicine (Board Review Series)
Forensic Emergency Medicine (Board Review Series)

Updated for its Second Edition, this text provides the information emergency departments need about the medicolegal aspects of treating victims of violence, motor vehicle accidents, sexual assault, child abuse, elder abuse, and intimate partner abuse. It offers detailed guidelines on interviewing and examining the victim and...

Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

Investigating Child Exploitation: The Internet, Law and Forensic Science
Investigating Child Exploitation: The Internet, Law and Forensic Science
This work is the culmination of many years of study and work. During my undergraduate
and graduate work, my primary research interests revolved around
domestic violence, sexual assault, child abuse, and child exploitation. Feminism,
the Constitution, freedom of expression and privacy, politics, and the
dynamics of power are
...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy