Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
Whether monitoring the Internet for threats and chatter, capturing computer evidence, or crunching forensic data, Guidance Software's EnCase computer forensics software is recognized as the premier computer forensics tool on the market. For investigation professionals, EnCE certification tells the world that you've not only mastered the use of...
Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence presents an overview of computer forensics perfect for beginners. This volume will serve as a foundation and guide for: (a) students considering a career in this field; (b) the law enforcement investigator assigned to work cybercrimes; (c) establishing training programs for forensic...
Illustrated Guide to Home Chemistry Experiments: All Lab, No Lecture (DIY Science)
Illustrated Guide to Home Chemistry Experiments: All Lab, No Lecture (DIY Science)

For students, DIY hobbyists, and science buffs, who can no longer get real chemistry sets, this one-of-a-kind guide explains how to set up and use a home chemistry lab, with step-by-step instructions for conducting experiments in basic chemistry -- not just to make pretty colors and stinky smells, but to learn how to do real lab...

Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Structural Investigation of Historic Buildings: A Case Study Guide to Preservation Technology for Buildings, Bridges, Towers and Mills
Structural Investigation of Historic Buildings: A Case Study Guide to Preservation Technology for Buildings, Bridges, Towers and Mills

A toolkit for giving our historic built environment a second life

Conservation of our existing structures has obvious economic and social value. Moreover, historic structures provide an excellent laboratory for studying aspects of structural engineering, materials science, forensic engineering, and building design. Structural...

EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
Fully revised for the very latest EnCE exam and EnCase software

EnCE certification tells the world that you've not only mastered the use of EnCase Forensic Software, but also that you have acquired the in-depth forensics knowledge and techniques you need to conduct complex computer examinations. This official study guide,...

Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)
Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)

In this revised and expanded edition, leading forensic scientist John Trestrail offers a pioneering survey of all that is known about the use of poison as a weapon in murder. Topics range from the use of poisons in history and literature to convicting the poisoner in court, and include a review of the different types of poisons, techniques...

Investigating Child Exploitation: The Internet, Law and Forensic Science
Investigating Child Exploitation: The Internet, Law and Forensic Science
This work is the culmination of many years of study and work. During my undergraduate
and graduate work, my primary research interests revolved around
domestic violence, sexual assault, child abuse, and child exploitation. Feminism,
the Constitution, freedom of expression and privacy, politics, and the
dynamics of power are
...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Crime Scene Photography, Second Edition
Crime Scene Photography, Second Edition

This textbook is designed for two principal photography student types. One group is the student in an academic setting. Students are expected to acquire a solid grasp of the theories and concepts of their various courses. This is the Knowledge point of the “KSAs” frequently required by employers. Students in an academic...

Understanding Forensic Digital Imaging
Understanding Forensic Digital Imaging
The science of digital imaging can be divided into two separate branches: the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy