Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
5G-Enabled Vehicular Communications and Networking (Wireless Networks)
5G-Enabled Vehicular Communications and Networking (Wireless Networks)

This book investigates and reviews recent advanced techniques and important applications in vehicular communications and networking (VCN) from a novel perspective of the combination and integration of VCN and connected vehicles, which provides a significant scientific and technical support for future 5G-based...

On the Brink of Paradox: Highlights from the Intersection of Philosophy and Mathematics (The MIT Press)
On the Brink of Paradox: Highlights from the Intersection of Philosophy and Mathematics (The MIT Press)
An introduction to awe-inspiring ideas at the brink of paradox: infinities of different sizes, time travel, probability and measure theory, and computability theory.


This award-winning book introduces the reader to awe-inspiring issues at the intersection of philosophy and mathematics. It explores ideas at the
...
Corporate Governance and Diversity in Boardrooms: Empirical Insights into the Impact on Firm Performance
Corporate Governance and Diversity in Boardrooms: Empirical Insights into the Impact on Firm Performance

This book explores diversity in boardrooms to highlight the link between the heterogeneous dimensions of board diversity and their impact on the firms. The book provides a brief definition of corporate governance and focuses on the role and functions of the board of directors. The work contributes to the literature enriching the...

Advances in Applied Artificial Intelligence (Computational Intelligence and Its Applications)
Advances in Applied Artificial Intelligence (Computational Intelligence and Its Applications)
Discussion on the nature of intelligence long pre-dated the development of the
electronic computer, but along with that development came a renewed burst of investigation
into what an artificial intelligence would be. There is still no consensus on how
to define artificial intelligence: Early definitions tended to discuss the type of
...
Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to...
PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach

Analysis and Control of Boolean Networks presents a systematic new approach to the investigation of Boolean control networks. The fundamental tool in this approach is a novel matrix product called the semi-tensor product (STP). Using the STP, a logical function can be expressed as a conventional discrete-time linear system. In the light of...

Enterprise Resource Planning: Global Opportunities and Challenges
Enterprise Resource Planning: Global Opportunities and Challenges
How can ERP be used to improve the overall organizational operating efficiency and effectiveness? How is ERP going to evolve in the future and what are the implications for Electronic commerce? The overall objective of Enterprise Resource Planning: Global Opportunities and Challenges is to provide students, academicians and practitioners interested...
unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy