Windows Forensics: The Field Guide for Corporate Computer Investigations
The evidence is in--to solve Windows crime, you need Windows tools
An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime.
ESP, Psychokinesis, and Psychics
Many people have experienced psi, whether as a sense of having been in a place before (deja vu), hearing a voice in their head that gave them guidance, or following their intuition. For some, these events can be attributed to coincidence, but for psychics, such episodes occur more frequently and intensely, often manifesting in dreams,...
Getting Started With SAS Enterprise Miner 5.2 SAS defines data mining as the process of uncovering hidden patterns in large amounts of data. Many industries use data mining to address business problems and opportunities such as fraud detection, risk and affinity analyses, database marketing, householding, customer churn, bankruptcy prediction, and... Writing Secure Code for Windows Vista (Pro - Step By Step Developer)
Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...
Food Chemical Risk Analysis (Food Science & Safety Series)
The recognition that chemicals in food, whatever their origin, might
present a risk to the consumer has long been recognised. However, early
food regulations at the beginning of the century were primarily aimed at
prevention of adulteration and fraud rather than directed at consumer
safety. It is only in the second half of the century...
Information Technology Auditing (with ACL CD-ROM)
The third edition of this text contains key improvements and changes that continue to
provide instructors and students with the best information technology auditing text
available. This edition has been reorganized and expanded to address the internal control
and audit issues mandated by Sarbanes-Oxley legislation. The third edition...
Computer Crime: A Crimefighter's Handbook (Computer Security)
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to ...
|Result Page: 11 10 9 8 7 6 5 4 3 2 1 |