Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Python Forensics: A workbench for inventing and sharing digital forensic technology
Python Forensics: A workbench for inventing and sharing digital forensic technology

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build...

Cloud Storage Forensics
Cloud Storage Forensics

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the...

Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
Enterprise Resource Planning: Global Opportunities and Challenges
Enterprise Resource Planning: Global Opportunities and Challenges
How can ERP be used to improve the overall organizational operating efficiency and effectiveness? How is ERP going to evolve in the future and what are the implications for Electronic commerce? The overall objective of Enterprise Resource Planning: Global Opportunities and Challenges is to provide students, academicians and practitioners interested...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Quantum Gravitation: The Feynman Path Integral Approach
Quantum Gravitation: The Feynman Path Integral Approach
The book covers the theory of Quantum Gravitation from the point of view of Feynman path integrals. These provide a manifestly covariant approach in which fundamental quantum aspects of the theory such as radiative corrections and the renormalization group can be systematically and consistently addressed. The path integral method is suitable for...
Kant's Search for the Supreme Principle of Morality
Kant's Search for the Supreme Principle of Morality
'... the author joins the discussion of the grounds for a moral theory that has preoccupied philosophers for some time, and advances that discussion significantly further. This is a book that will be required reading for those interested in that topic of Kant's moral theory.' Roger Sullivan, author of Immanuel Kant's Moral Theory and An...
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Biology (Glencoe Science)
Biology (Glencoe Science)

When you read Glencoe Biology, you need to read for information. Science is nonfiction writing; it describes real-life events, people, ideas, and technology. Here are some tools that Glencoe Biology has to help you read.

The foundation of scientific knowledge is Investigation and Experimentation. In this section, you will...
Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications presents both theories and applications of computational intelligence in a clear, precise and highly comprehensive style. The textbook addresses the fundamental aspects of fuzzy sets and logic, neural networks, evolutionary computing and belief networks. The...
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy