Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Personality Disorders in Modern Life
Personality Disorders in Modern Life
A revision of the leading textbook on personality disorders by renowned expert Theodore Millon

"Personalities are like impressionistic paintings. At a distance, each person is ‘all of a piece’; up close, each is a bewildering complexity of moods, cognitions, and motives."
–Theodore Millon

...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be protected by security guards, cipher locks, and an ID badge worn by all employees. As the computing paradigm is continually changing with shared resources and mobility, firewalls and antivirus software are also not enough to protect critical assets. This...
Practical Digital Forensics
Practical Digital Forensics

Get started with the art and science of digital forensics with this practical, hands-on guide!

About This Book

  • Champion the skills of digital forensics by understanding the nature of recovering and preserving digital information which is essential for legal or disciplinary proceedings
  • ...
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic...
Windows Registry Forensics, Second Edition: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics, Second Edition: Advanced Digital Forensic Analysis of the Windows Registry

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files,...

Unsolved Crimes (Criminal Investigations)
Unsolved Crimes (Criminal Investigations)
In "Unsolved Crimes", famous, unresolved cases from the past 120 years are examined to review what police and experts in forensic science did (or failed to do) while trying to resolve each crime. For each case covered, the key theories and suspects are described. Though technology is much improved since the time of Jack the Ripper in...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

When Law and Medicine Meet: A Cultural View (International Library of Ethics, Law, and the New Medicine)
When Law and Medicine Meet: A Cultural View (International Library of Ethics, Law, and the New Medicine)

What happens when two systems, law and medicine, are joined in the arena of the court? This work deals with the structure and the premises of two diverse discourse models; the approach is anthropological.

Several chapters are preponderantly based on legal research, addressing cases requiring testimony by expert witnesses on recent...

Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
THWART THE LATEST DISASTROUS ATTACKS

Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the...

Forensic Engineering Investigation
Forensic Engineering Investigation
Forensic engineering is the application of engineering principles, knowledge,
skills, and methodologies to answer questions of fact that may have legal
ramifications. Forensic engineers typically are called upon to analyze car
accidents, building collapses, fires, explosions, industrial accidents, and various
calamities
...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy