Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Encyclopedia of Medical Genomics and Proteomics 2 vol. set
Encyclopedia of Medical Genomics and Proteomics 2 vol. set

Updating researchers on phenomenal progress in the field of molecular medicine the Encyclopedia of Medical Genomics and Proteomics offers trail-blazing studies and authoritative contributions from more than 400 specialists. An important and timely contribution to the biomedical community, the encyclopedia compiles...

Textile Fiber Microscopy: A Practical Approach
Textile Fiber Microscopy: A Practical Approach

A groundbreaking text to the study of textile fibers that bridges the knowledge gap between fiber shape and end uses

Textile Fiber Microscopy offers an important and comprehensive guide to the study of textile fibers and contains a unique text that prioritizes a review of fibers’ microstructure,...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

CISSP Exam Cram 2
CISSP Exam Cram 2

Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during...

Rape Investigation Handbook
Rape Investigation Handbook
"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com

An unprecedented collaborative work -- the first
...
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Forensic CBT: A Handbook for Clinical Practice
Forensic CBT: A Handbook for Clinical Practice

Forensic CBT: A Handbook for Clinical Practice is an edited collection that represents the first authoritative resource on the utilization of CBT strategies and techniques for offender clients.

  • Features contributions from leaders of the major schools of CBT on the treatment of antisocial personality patterns as well...
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the...
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. It contains a collection of the recent advances in the technology ranging from...
Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy