Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

CNET Do-It-Yourself Home Networking Projects
CNET Do-It-Yourself Home Networking Projects
You may be thinking that home networking is so ubiquitous there could not possibly be anything new or different to do with this interconnected marvel of now everyday technology. You can surf the Web on any of two to three PCs, upload and download photos, fill an MP3 player to the brim, and chat with your friends and family via IM—what more...
JBoss RichFaces 3.3
JBoss RichFaces 3.3
JBoss RichFaces is a rich component library for JavaServer Faces and an AJAX framework that allows easy integration of AJAX capabilities into complex business applications. Do you wish to eliminate the time involved in writing JavaScript code and managing JavaScript-compatibility between browsers to build an AJAX web application quickly?
...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Modern Operating Systems
Modern Operating Systems
For software development professionals and computer science students, Modern Operating Systems gives a solid conceptual overview of operating system design, including detailed case studies of Unix/Linux and Windows 2000.

What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Mathematical Methods for Physics and Engineering: A Comprehensive Guide
Mathematical Methods for Physics and Engineering: A Comprehensive Guide
From reviews of previous editions: '...a great scientific textbook. It is a tour de force ... to write mathematical sections that are both complete and at an appropriate academic level. The authors have clearly succeeded in this challenge, making this a remarkable pedagogical book ... The choice of exercises is excellent and possibly the best...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy