Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Semantic Computing
Semantic Computing

Presents the state of the technology and points to future directions for semantic computing

Semantic computing, a rapidly evolving interdisciplinary field, seeks to structure, design, and manipulate computer content to better satisfy the needs and intentions of users and create a more meaningful user experience. This...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Quantum Gravitation: The Feynman Path Integral Approach
Quantum Gravitation: The Feynman Path Integral Approach
The book covers the theory of Quantum Gravitation from the point of view of Feynman path integrals. These provide a manifestly covariant approach in which fundamental quantum aspects of the theory such as radiative corrections and the renormalization group can be systematically and consistently addressed. The path integral method is suitable for...
Beginning Data Science with Python and Jupyter: Use powerful tools to unlock actionable insights from data
Beginning Data Science with Python and Jupyter: Use powerful tools to unlock actionable insights from data

Getting started with data science doesn't have to be an uphill battle. This step-by-step guide is ideal for beginners who know a little Python and are looking for a quick, fast-paced introduction.

Key Features

  • Get up and running with the Jupyter ecosystem and some example datasets
  • ...
Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

An Introduction to Trading in the Financial Markets SET: An Introduction to Trading in the Financial Markets: Technology: Systems, Data, and Networks
An Introduction to Trading in the Financial Markets SET: An Introduction to Trading in the Financial Markets: Technology: Systems, Data, and Networks

This book is the third in a set of books that address the trading markets. We use the term “trading markets” because that is the most general term we can find for the portion of the financial markets sometimes imprecisely referred to as the securities markets. (We explained these distinctions in Book 1, An Introduction to Trading...

Learning Java Functional Programming
Learning Java Functional Programming

Create robust and maintainable Java applications using the functional style of programming

About This Book

  • Explore how you can blend object-oriented and functional programming styles in Java
  • Use lambda expressions to write flexible and succinct code
  • A tutorial that...
ULSI Devices
ULSI Devices

A complete guide to current knowledge and future trends in ULSI devices Ultra-Large-Scale Integration (ULSI), the next generation of semiconductor devices, has become a hot topic of investigation. ULSI Devices provides electrical and electronic engineers, applied physicists, and anyone involved in IC design and process development with a...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy