Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of...
Introduction to Civil Engineering Systems: A Systems Perspective to the Development of Civil Engineering Facilities
Introduction to Civil Engineering Systems: A Systems Perspective to the Development of Civil Engineering Facilities

This book presents an integrated systems approach to the evaluation, analysis, design, and maintenance of civil engineering systems. Addressing recent concerns about the world's aging civil infrastructure and its environmental impact, the author makes the case for why any civil infrastructure should be seen as part of a larger whole. He...

Secrets of Podcasting : Audio Blogging for the Masses
Secrets of Podcasting : Audio Blogging for the Masses
If you thought Internet radio was cool, wait 'til you experience podcasting--regular audio programs delivered via the Internet, which you can listen to when you want, where you want! Here to lead you into this brave, new world of mass audio blogging--and quite possibly change your listening habits forever--is a fun, fact-filled guide that shows you...
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so...

Beginning Access 2007 VBA
Beginning Access 2007 VBA

If you want to take your Access databases to a more robust level of functionality, then this is the book for you. It provides the tools and techniques you'll need in order to build more sophisticated solutions. You'll find plenty of source code and fully developed sample applications to guide you along the way.

After walking through the...

X Internet: The Executable and Extendable Internet
X Internet: The Executable and Extendable Internet
Evolving from the current PSTN to Internet Telephony is not an easy task. … The two authors [of this book] are uniquely qualified to explain how this evolution can be architected. … Both authors have used their unique expertise to produce this very first book on the topic.
-From the Foreword by Roch Glitho, Ph.D.,
...
Computer Forensics For Dummies (Computer/Tech)
Computer Forensics For Dummies (Computer/Tech)
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master...
eBay Business All-in-OneFor Dummies (Business & Personal Finance)
eBay Business All-in-OneFor Dummies (Business & Personal Finance)
Want to become an eBay entrepreneur? Nobody knows more about starting an eBay business than Marsha Collier, and she’s put it all in 1-2-3 order for you in eBay Business All-in-One For Dummies, 2nd Edition.

This all-in-one guide includes nine handy minibooks that cover:

  • eBay Basics
  • ...
Selected Cases from the Supreme People’s Court of the People’s Republic of China: Volume 1 (Library of Selected Cases from the Chinese Court)
Selected Cases from the Supreme People’s Court of the People’s Republic of China: Volume 1 (Library of Selected Cases from the Chinese Court)
This volume includes guiding cases of the Supreme People’s Court, cases deliberated on by the Judicial Council/Committee of the Supreme People’s Court, and cases discussed at the Joint Meetings of Presiding Judges from the various tribunals. This book is divided into four sections, including Cases by Justices, Selected...
Quantitative Assessment of Securitisation Deals (SpringerBriefs in Finance)
Quantitative Assessment of Securitisation Deals (SpringerBriefs in Finance)
Securitisation deals have come to the fore during recent years owing to the challenges involved in their assessment and their role in the recent credit crises. These deals are created by the pooling of assets and the tranching of liabilities. The latter is backed by collateral pools. Tranching makes it possible to create liabilities...
Social Entrepreneurship and Social Business: An Introduction and Discussion with Case Studies
Social Entrepreneurship and Social Business: An Introduction and Discussion with Case Studies
Social entrepreneurship has become a relevant topic in business, society and politics. Public attention has also been aroused through the increasing presence of social entrepreneurs in the media and numerous popular science publications. Here we may mention David Bornstein ´s book “How to Change the World: Social...
A Fiduciary Approach to Delegated and Implementing Rule-Making in the EU: How to Trust the Commission
A Fiduciary Approach to Delegated and Implementing Rule-Making in the EU: How to Trust the Commission

This book focuses on the evaluation of delegated and implementing rule-making, based on Articles 290 and 291 TFEU. These articles have attracted considerable attention since their introduction in 2009, and their implementation is one of the most hotly debated questions in European Administrative Law. The book takes up this...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy