Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Forensic Analysis DVD Toolkit, Second Edition
Windows Forensic Analysis DVD Toolkit, Second Edition

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior
...

Reason in Action (Collected Essays, Vol. 1)
Reason in Action (Collected Essays, Vol. 1)

Reason in Action collects John Finnis' work on the theory of practical reason and moral philosophy. The essays in the volume range from foundational issues of meta-ethics to the practical application of natural law theory to ethical problems such as nuclear deterrence, obscenity and free speech, and abortion and cloning.
...

Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions

Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their...

Encyclopedia of Human Resource Management, Key Topics and Issues (Volume 1)
Encyclopedia of Human Resource Management, Key Topics and Issues (Volume 1)

Human resource management is a vital function of any organization, at the nexus of business practice, psychology, and law. This one-of-a-kind and all-in-one print and online encyclopedia offers access to information on all manner of topics and issues related to the "people" side of business. Volume 1 covers an A-Z spectrum of all...

Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Nonlinear Analysis and Synthesis Techniques for Aircraft Control (Lecture Notes in Control and Information Sciences)
Nonlinear Analysis and Synthesis Techniques for Aircraft Control (Lecture Notes in Control and Information Sciences)
Despite many significant advances in the theory of nonlinear control in recent years, the majority of control laws implemented in the European aerospace industry are still designed and analysed using predominantly linear techniques applied to linearised models of the aircrafts’ dynamics. Given the continuous increase in the complexity of...
Silicon Photonics
Silicon Photonics
Silicon is a material where the extraordinary is made ordinary.1 This statement has been prompted by the rapid (exponential) development of the industry based on manufacturing silicon devices, which has seen enormous performance improvements and cost reductions over the last fifty years. Coming after the stone, iron, and...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
From Gutenberg to Google: Electronic Representations of Literary Texts
From Gutenberg to Google: Electronic Representations of Literary Texts

Although this book focuses on the problems and potentials for electronic representations of the fundamental materials of document-based knowledge in literature, similar conditions obtain for representations of works in music, philosophy, history, the law, and religion. These fields find in paper documents the primary materials of...

A Statistical Guide for the Ethically Perplexed
A Statistical Guide for the Ethically Perplexed

For disciplines concerned with human well-being, such as medicine, psychology, and law, statistics must be used in accordance with standards for ethical practice. A Statistical Guide for the Ethically Perplexed illustrates the proper use of probabilistic and statistical reasoning in the behavioral, social, and biomedical...

Supply Chain Imperative, The: How to Ensure Ethical Behavior in Your Global Suppliers
Supply Chain Imperative, The: How to Ensure Ethical Behavior in Your Global Suppliers

Like many companies in all industries, yours is making an admirable new commitment to higher ethical standards. You’ve worked hard to build or restore your reputation and the trust of your stakeholders. But all your best efforts may be undermined if the many links in your supply chain do not follow suit.

The Supply Chain...

Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
unlimited object storage image
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy