Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.
T-SQL Fundamentals (3rd Edition)
Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces...
Algorithmics: The Spirit of Computing (3rd Edition) From a review of the first edition:
‘This book is a veritable tour de force. Harel writes with uncommon verve, clarity and imagination.'
‘Through the use of tantalizing questions and aptly chosen and often amusing examples, the author transmits to the reader the excitement and intellectual satisfaction of computer science...
Auditing Cloud Computing: A Security and Privacy Guide
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...
Automotive Electromagnetic Compatibility (EMC) This book is an introduction to the subject of EMC for automotive engineers, test engineers and technicians. Its focus is on the practical use and application of EMC concepts. Contents include basic concepts, such as power and signal integrity, antennas and transmission lines, active and passive components, testing, cabling, signal and power... A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....
|Result Page: 28 27 26 25 24 23 22 21 20 19 |