Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
THWART THE LATEST DISASTROUS ATTACKS

Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and Practice
Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and Practice
The focused ion beam (FIB) instrument has experienced an intensive period of maturation since its inception. Numerous new techniques and applications have been brought to fruition by the tireless efforts of some very innovative scientists with the foresight to recognize the potential of this upstart apparatus. Over the past few years, the FIB has...
Incident Response: Computer Forensics Toolkit
Incident Response: Computer Forensics Toolkit
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer...

Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Brain Imaging in Substance Abuse: Research, Clinical, and Forensic Applications (Forensic Science and Medicine)
Brain Imaging in Substance Abuse: Research, Clinical, and Forensic Applications (Forensic Science and Medicine)

The last two decades have seen prodigious growth in the application of brain imaging methods to questions of substance abuse and addiction. Despite considerable advances in our understanding of the central effects of drugs provided by preclinical data, relatively little direct evidence was known of how substances of abuse affect the brain and...

Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem

Philosophers of science have long used reconstructive reasoning to develop historical explanations covering the origins of natural phenomenon. The application of the scientific method is a powerful tool for solving crimes through reconstruction of the events. Scientific Foundations of Crime Scene Reconstruction: Introducing Method to...

Forensic Emergency Medicine (Board Review Series)
Forensic Emergency Medicine (Board Review Series)

Updated for its Second Edition, this text provides the information emergency departments need about the medicolegal aspects of treating victims of violence, motor vehicle accidents, sexual assault, child abuse, elder abuse, and intimate partner abuse. It offers detailed guidelines on interviewing and examining the victim and...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy