Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
206 Bones: A Novel (Temperance Brennan)
206 Bones: A Novel (Temperance Brennan)

The #1 New York Times bestselling author and producer of the Fox television hit, Bones, returns with a spectacular new Tempe Brennan novel.

There are 206 bones in the human body. Forensic anthropologists know them intimately, can read in them stories of brief or long lives and use them to reconstruct every kind of...

Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)
Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)
Moore explains the difficulties in applying traditional Fourth Amendment jurisprudence several of the more common warrantless search doctrines, in order to determine what aspects of traditional search and seizure doctrine apply to crimes involving technology. To amplify his points, he discusses several high technology crimes. Additionally, he...
Incident Response: Computer Forensics Toolkit
Incident Response: Computer Forensics Toolkit
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer...

Psychology and Law: Truthfulness, Accuracy and Credibility
Psychology and Law: Truthfulness, Accuracy and Credibility

How can psychology inform law and policing to help determine the accuracy of witnesses, victims and suspects?

This second edition of Psychology and Law: Truthfulness, Accuracy and Credibility is a substantially revised and exhaustive review of forensic research to do with credibility and the accuracy of evidence.

...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Forensic Analytical Techniques
Forensic Analytical Techniques

The book will be an open learning / distance learning text in the Analytical Techniques for the Sciences (AnTS) covering analytical techniques used in forensic science. No prior knowledge of the analytical techniques will be required by the reader.

An introductory chapter will provide an overview of the science of the...

Human and Nonhuman Bone Identification: A Color Atlas
Human and Nonhuman Bone Identification: A Color Atlas
When someone presents a bone (or series of bones) to a forensic anthropologist for identification, deciding whether or not the bone is human is one of the first steps in determining its importance in a medicolegal investigation.  Almost every forensic anthropologist has been asked to drop everything and go to a scene that has been secured by...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Introduction to Data Analysis with R for Forensic Scientists (International Forensic Science and Investigation)
Introduction to Data Analysis with R for Forensic Scientists (International Forensic Science and Investigation)

Statistical methods provide a logical, coherent framework in which data from experimental science can be analyzed. However, many researchers lack the statistical skills or resources that would allow them to explore their data to its full potential. Introduction to Data Analysis with R for Forensic Sciences minimizes...

Hughes' Outline of Modern Psychiatry
Hughes' Outline of Modern Psychiatry

In this new edition of the highly successful book originally written by Jennifer Hughes, her co-author on the fourth edition, David Gill, presents a fully revised and updated text that continues to be a comprehensive account of current practice in psychiatry.  The book covers classification, causes and prevention of psychiatric disorders...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy