Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

You've just gotta love Ubuntu; it's an irresistible package of usability, security, and support features. But a power user like you is just itching to teach it some new tricks. Show it how to play nicely with other systems. Develop its multitasking and communication skills. Free its inner video and graphics talents. And make sure that when it...

IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Windows Forensic Analysis DVD Toolkit
Windows Forensic Analysis DVD Toolkit
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and...
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the
...
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of...
Dictionary of Information Security
Dictionary of Information Security

IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification...

Computer Forensics For Dummies (Computer/Tech)
Computer Forensics For Dummies (Computer/Tech)
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master...
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Does the gunshot residue reveal how far from the target a weapon was fired? Is there any trace evidence to prove the accused handled a specific firearm? What is the likely behaviour of a ricocheting bullet? Do the marks on a bullet prove categorically that it was fired from a particular weapon? These are all issues (amongst others) that the fully...
Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

Virtualization creates new and difficult challenges for forensic investigations. Operating systems and applications running in virtualized environments often leave few traces, yielding little evidence with which to conduct an investigation.

Virtualization and Forensics offers an in-depth view into the world of virtualized...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy