 |
|
 |  |  Forensic Computing (Practitioner)Throughout this book you will find that we have consistently referred to the term “Forensic Computing” for what is often elsewhere called “Computer Forensics”. In the UK, however,when we first started up, the name “Computer Forensics” had been registered to a commercial company that was operating in this field... |  |  Multicultural Manners: Essential Rules of Etiquette for the 21st CenturyBasically, this is still a how-to book—how to get along with others who are culturally different. As before, it is not targeted just to those who travel or conduct international business. Cultural information has many applications: To help interact more effectively with new populations from East Africa, the San Diego Police Department has... |
|
|
|
 The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... |  |  Oracle 10g Developing Media Rich ApplicationsIntegrating Multimedia features in databases in one of the most important new applications in the last 20 years
Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997,... |  |  Handbook of Loss Prevention and Crime Prevention, Fourth EditionSecurity breaches, theft, and lack of resources due to natural or man-made disaster are all forms of corporate loss. The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, shows how to avoid or minimize these losses with a wealth of practical information. This revised volume brings together the expertise of... |
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |