Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Forensic Cremation Recovery and Analysis
Forensic Cremation Recovery and Analysis
Immediately apparent is the author’s vast experience in processing fire scenes and analyzing cremains. … a well-written text that is a valuable resource to forensic anthropology students and fire scene responders alike.
—J.C. Love, Harris County Medical Examiner’s Office, Houston, Texas,
...
Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.

This unique collection details how to
...

Contrast Agents III: Radiopharmaceuticals - From Diagnostics to Therapeutics (Topics in Current Chemistry) (v. 3)
Contrast Agents III: Radiopharmaceuticals - From Diagnostics to Therapeutics (Topics in Current Chemistry) (v. 3)
It is the objective of this review to introduce the reader to the current status of organometallic chemistry, oriented towards the development of novel 99mTc-based imaging agents. This type of inorganic chemistry has nowadays become part of so-called bioorganometallic chemistry.

The article describes the current
...
Water-Related Death Investigation: Practical Methods and Forensic Applications
Water-Related Death Investigation: Practical Methods and Forensic Applications

All too often, police called to the scene of a water-related death may consider it an accidental drowning before they even arrive. But the investigation of these types of deaths requires the same careful and thorough documentation as in other potentially non-natural deaths and these efforts must be carried through all stages of investigation....

The Magnetocaloric Effect and its Applications (Series in Condensed Matter Physics)
The Magnetocaloric Effect and its Applications (Series in Condensed Matter Physics)
This book is a very comprehensive overview. It is interesting both for the experienced researcher and also for students just entering the field. Theory, experimental techniques, and literature are widely covered.
- Professor Bruck Ekkes

The magnetocaloric effect describes the change in temperature of a magnetic material
...
Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Task Scheduling for Parallel Systems (Wiley Series on Parallel and Distributed Computing)
Task Scheduling for Parallel Systems (Wiley Series on Parallel and Distributed Computing)

A new model for task scheduling that dramatically improves the efficiency of parallel systems

Task scheduling for parallel systems can become a quagmire of heuristics, models, and methods that have been developed over the past decades. The author of this innovative text cuts through the confusion and complexity by...

What is What in the Nanoworld: A Handbook on Nanoscience and Nanotechnology
What is What in the Nanoworld: A Handbook on Nanoscience and Nanotechnology
More than 1,400 entries, from a few sentences to a page in length. The second, completely revised and enlarged edition of this introductory reference handbook summarizes the terms and definitions, most important phenomena, and regulations occurring in the physics, chemistry, technology, and application of nanostructures. A representative collection...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic...
Mastering Hyper-V Deployment
Mastering Hyper-V Deployment

I have been working with Hyper-V since the beta release of it for Windows Server 2008. There was a lot to learn with the brand new product. It quickly became evident that Hyper-V was just a tiny piece of the entire puzzle. A Hyper-V project is much more than just a virtualization project. It is a project that will change how your server...

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy