Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Registry Forensics, Second Edition: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics, Second Edition: Advanced Digital Forensic Analysis of the Windows Registry

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files,...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Forensic Science: Fundamentals and Investigations
Forensic Science: Fundamentals and Investigations
Finally, a textbook that provides the science behind forensics, as well as labs and activities appropriate for high school students! Forensic Science: Fundamentals and Investigations is student and teacher friendly. Teachers can conduct a full-year’s study of forensics or select topics that can be incorporated into a...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and Practice
Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and Practice
The focused ion beam (FIB) instrument has experienced an intensive period of maturation since its inception. Numerous new techniques and applications have been brought to fruition by the tireless efforts of some very innovative scientists with the foresight to recognize the potential of this upstart apparatus. Over the past few years, the FIB has...
Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)
Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)

Publius Syrus stated back in 42 B.C., “You cannot put the same shoe on every foot.” (Maxim 596) Though written long before the advent of forensic science, Syrus’ maxim summarizes the theme of Forensic Medicine of the Lower Extremity: Human Identification and Trauma Analysis of the Thigh, Leg, and Foot. Put simply, the lower...

CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Police work deals with human nature, which is always changing and, therefore, constantly poses new challenges for the law enforcement officer. The skills learned in basic police training are just that — basic. Officers must seek continual training to keep up with their criminal counterparts.

The investigation of crimes such as
...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy