Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Water-Related Death Investigation: Practical Methods and Forensic Applications
Water-Related Death Investigation: Practical Methods and Forensic Applications

All too often, police called to the scene of a water-related death may consider it an accidental drowning before they even arrive. But the investigation of these types of deaths requires the same careful and thorough documentation as in other potentially non-natural deaths and these efforts must be carried through all stages of investigation....

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic...
Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)
Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)

Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book...

Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Digital Forensics: Digital Evidence in Criminal Investigations
Digital Forensics: Digital Evidence in Criminal Investigations

The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific...

Personality Disorder: Temperament or Trauma? An Account of an Emancipatory Research Study Carried Out by Service Users Diagnosed with Perso (Forensic Focus)
Personality Disorder: Temperament or Trauma? An Account of an Emancipatory Research Study Carried Out by Service Users Diagnosed with Perso (Forensic Focus)

Personality Disorder (PD) is one of the most difficult psychological conditions to classify and treat and in the past literature on the subject has tended to neglect the invaluable viewpoint of sufferers themselves. Drawing on extensive research carried out in conjunction with service users, Heather Castillo seeks to adjust this imbalance and...

Drugs of Abuse: Body Fluid Testing (Forensic Science and Medicine)
Drugs of Abuse: Body Fluid Testing (Forensic Science and Medicine)

A comprehensive review of the science of drug testing in all its aspects, placing emphasis on technologies that use body fluids other than urine for determining the presence of drugs of abuse. The authors discuss the various body fluid specimens suitable for testing for illicit drugs-particularly saliva, sweat, and hair-describe the...

Advanced Crime Scene Photography
Advanced Crime Scene Photography

Advanced Crime Scene Photography developed over time and out of my experiences as a crime scene investigator with a large metropolitan police department. Like any major city, violent crime is prevalent, offering numerous opportunities to utilize the different skills and techniques learned and evolved through numerous schools, scene...

Rootkits for Dummies (Computer/Tech)
Rootkits for Dummies (Computer/Tech)
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
Forensic Chemistry
Forensic Chemistry

As the number of forensic science and forensic chemistry degree programs has increased over the last few years, Forensic Chemistry was the first book to specifically address this rapidly growing field. It introduces the principal areas of study from the perspective of analytical chemistry, addressing the legal context in which forensic...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy