Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Facts on File Dictionary of Chemistry (Facts on File Science Dictionary)
The Facts on File Dictionary of Chemistry (Facts on File Science Dictionary)

This dictionary is one of a series designed for use in schools. It is intended for students of chemistry, but we hope that it will also be helpful to other science students and to anyone interested in science. Facts On File also publishes dictionaries in a variety of disciplines, including biology, physics, mathematics, forensic science,...

Good Laboratory Practices for Forensic Chemistry (SpringerBriefs in Pharmaceutical Science & Drug Development)
Good Laboratory Practices for Forensic Chemistry (SpringerBriefs in Pharmaceutical Science & Drug Development)

Good Laboratory Practices for Forensic Chemistry acknowledges the limitations that often challenge the validity of data and resultant conclusions. Eight chapters examine current practices in analytical chemistry as well as business practices, guidelines and regulations in the pharmaceutical industry to offer...

Manual of Forensic Taphonomy
Manual of Forensic Taphonomy

Forensic taphonomy is the study of the postmortem changes to human remains, focusing largely on environmental effects―including decomposition in soil and water and interaction with plants, insects, and other animals. While other books have focused on subsets such as forensic botany and entomology, Manual of Forensic Taphonomy is...

Mass Spectrometry: Instrumentation, Interpretation, and Applications
Mass Spectrometry: Instrumentation, Interpretation, and Applications
With contributions from noted experts from Europe and North America, Mass Spectrometry Instrumentation, Interpretation, and Applications serves as a forum to introduce students to the whole world of mass spectrometry and to the many different perspectives that each scientific field brings to its use. The book emphasizes the use of this...
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators...

And Every Word Is True: Newfound evidence reveals Truman Capote's
And Every Word Is True: Newfound evidence reveals Truman Capote's
Truman Capote’s bestselling book “In Cold Blood” has captivated worldwide audiences for over fifty years. It is a gripping story about the consequences of a trivial robbery gone terribly wrong in a remote village of western Kansas.But what if robbery was not the motive at all, but something more sinister? And why would the...
Instant Wireshark Starter
Instant Wireshark Starter

Wireshark is by far the most popular network traffic analyzing tool.

It not only provides an interface for traffic capture but also provides a rich platform for an in-depth analysis of the traffic. The GUI provides a very user friendly and interactive media that simplifies the process of network forensics. This concise book...

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware,...

Security Power Tools
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security...
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure....
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest...
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy