Home | Amazing | Today | Tags | Publishers | Years | Search 
What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be protected by security guards, cipher locks, and an ID badge worn by all employees. As the computing paradigm is continually changing with shared resources and mobility, firewalls and antivirus software are also not enough to protect critical assets. This...
Lee and Gaensslen's Advances in Fingerprint Technology,  Third Edition
Lee and Gaensslen's Advances in Fingerprint Technology, Third Edition

Reflecting new discoveries in fingerprint science, Lee and Gaensslen’s Advances in Fingerprint Technology, Third Edition has been completely updated with new material and nearly double the references contained in the previous edition. The book begins with a detailed review of current, widely used development techniques,...

Credibility Assessment: Scientific Research and Applications
Credibility Assessment: Scientific Research and Applications

In 2001, the late Murray Kleiner and an array of experts contributed to the Handbook of Polygraph Testing, published by Elsevier, which examined the fundamental principles behind polygraph tests and reviewed the key tests and methods used at that time. In the intervening thirteen years, the field has moved beyond traditional polygraph...

Illustrated Guide to Home Chemistry Experiments: All Lab, No Lecture (DIY Science)
Illustrated Guide to Home Chemistry Experiments: All Lab, No Lecture (DIY Science)

For students, DIY hobbyists, and science buffs, who can no longer get real chemistry sets, this one-of-a-kind guide explains how to set up and use a home chemistry lab, with step-by-step instructions for conducting experiments in basic chemistry -- not just to make pretty colors and stinky smells, but to learn how to do real lab...

Encyclopedia of Medical Genomics and Proteomics 2 vol. set
Encyclopedia of Medical Genomics and Proteomics 2 vol. set

Updating researchers on phenomenal progress in the field of molecular medicine the Encyclopedia of Medical Genomics and Proteomics offers trail-blazing studies and authoritative contributions from more than 400 specialists. An important and timely contribution to the biomedical community, the encyclopedia compiles...

Faulk's Basic Forensic Psychiatry
Faulk's Basic Forensic Psychiatry

After the second edition was published (in 1994), a number of changes have taken place, including changes in the law, advances in treatment, and changes in the management of prisons and special hospitals.

The book remains essential reading for doctors taking the Membership examination of the Royal College of Psychiatrists, but also...

Ultrawideband Radar: Applications and Design
Ultrawideband Radar: Applications and Design

Providing a practical review of the latest technology in the field, Ultrawideband Radar Applications and Design presents cutting-edge advances in theory, design, and practical applications of ultrawideband (UWB) radar. This book features contributions from an international team of experts to help readers learn about a wide range...

Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators...

Learning iOS Security
Learning iOS Security

Enhance the security of your iOS platform and applications using iOS-centric security techniques

About This Book

  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS...
Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy