|
|
|
|
|
| | Introduction to Network Security (Networking Series)In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators... | | |
|
|
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic EvidenceDoes the gunshot residue reveal how far from the target a weapon was fired? Is there any trace evidence to prove the accused handled a specific firearm? What is the likely behaviour of a ricocheting bullet? Do the marks on a bullet prove categorically that it was fired from a particular weapon? These are all issues (amongst others) that the fully... | | Mobile Forensics: Advanced Investigative Strategies
Key Features
-
A straightforward guide to address the roadblocks face when doing mobile forensics
-
Simplify mobile forensics using the right mix of methods, techniques, and tools
-
Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
| | |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |