|
|
|
|
|
|
| | Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... | | Mobile Forensics: Advanced Investigative Strategies
Key Features
-
A straightforward guide to address the roadblocks face when doing mobile forensics
-
Simplify mobile forensics using the right mix of methods, techniques, and tools
-
Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
|
|
Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Embedded computer systems are electronic systems that include a microcomputer to perform
specific dedicated tasks. The computer is hidden inside these products. Embedded
systems are ubiquitous. Every week millions of tiny computer chips come pouring out
of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,... | | Create Your Own Employee Handbook: A Legal and Practical GuideWhether your business has a few employees or several thousand, providing them with a handbook that spells out your company's benefits, policies and procedures makes great sense, practically and legally.
Create Your Own Employee Handbook provides all the information and policies managers, HR professionals and business owners need to create their... | | Code: Version 2.0The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times)
There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's)... |
|
|
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 |