Home | Amazing | Today | Tags | Publishers | Years | Search 
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
In the information technology age coupled with computer advances, information systems have become an integral part of many disciplines; accordingly, business, marketing, medicine, communication, banking, geography, physics, chemistry, aviation, pilots, forensics, agriculture, and even traf.c lights have one thing in common called...
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Forensic Chemistry
Forensic Chemistry

As the number of forensic science and forensic chemistry degree programs has increased over the last few years, Forensic Chemistry was the first book to specifically address this rapidly growing field. It introduces the principal areas of study from the perspective of analytical chemistry, addressing the legal context in which forensic...

Instant Wireshark Starter
Instant Wireshark Starter

Wireshark is by far the most popular network traffic analyzing tool.

It not only provides an interface for traffic capture but also provides a rich platform for an in-depth analysis of the traffic. The GUI provides a very user friendly and interactive media that simplifies the process of network forensics. This concise book...

EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide

The official, Guidance Software-approved book on the newest EnCE exam!

The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The only official Guidance-endorsed study guide on the topic,...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Digital Image Forensics: There is More to a Picture than Meets the Eye
Digital Image Forensics: There is More to a Picture than Meets the Eye

Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical...

Sparse Image and Signal Processing: Wavelets, Curvelets, Morphological Diversity
Sparse Image and Signal Processing: Wavelets, Curvelets, Morphological Diversity

This book presents the state of the art in sparse and multiscale image and signal processing, covering linear multiscale transforms, such as wavelet, ridgelet, or curvelet transforms, and non-linear multiscale transforms based on the median and mathematical morphology operators. Recent concepts of sparsity and morphological diversity are...

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

iOS Forensic Analysis: for iPhone, iPad, and iPod touch (Books for Professionals by Professionals)
iOS Forensic Analysis: for iPhone, iPad, and iPod touch (Books for Professionals by Professionals)

iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and...

Illustrated Guide to Home Chemistry Experiments: All Lab, No Lecture (DIY Science)
Illustrated Guide to Home Chemistry Experiments: All Lab, No Lecture (DIY Science)

For students, DIY hobbyists, and science buffs, who can no longer get real chemistry sets, this one-of-a-kind guide explains how to set up and use a home chemistry lab, with step-by-step instructions for conducting experiments in basic chemistry -- not just to make pretty colors and stinky smells, but to learn how to do real lab...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy