Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Global Financial Centers, Economic Power, and (In)Efficiency
Global Financial Centers, Economic Power, and (In)Efficiency

This book scrutinizes global financial flows and stocks, both financial assets and liabilities and their impact on the global balance of economic power, especially as they affect the largest and fastest-growing countries in both the developed and the developing world. It shows how financial flows can promote economic growth and...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Exchange Server Cookbook : For Exchange Server 2003 and Exchange 2000 Server
Exchange Server Cookbook : For Exchange Server 2003 and Exchange 2000 Server

Ask network administrators what their most critical computer application is, and most will say "email" without a moment's hesitation. If you run a network powered by Windows 2000 or Windows Server 2003, Microsoft Exchange occupies much of your time. According to Microsoft, 110 million Exchange seats have been...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

The Financial Crisis of Our Time (Financial Management Association Survey and Synthesis)
The Financial Crisis of Our Time (Financial Management Association Survey and Synthesis)

In 2006 residential real estate prices peaked and started to fall, then threatened the world's financial institutions in 2007, and confronted the global economy with disaster in 2008. In the past few years, millions of people have lost very substantial portions of their wealth. And while the markets have rebounded considerably, they are...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Virtualization, A Beginners Guide
Virtualization, A Beginners Guide

Migrate to a dynamic, on-demand data delivery platform

"If you're looking to hit the ground running with any virtualization project, large or small, this book is going to give you the start you need, and along the way will offer you some cautionary tales that will even take some seasoned...

AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Beginning SQL Server 2008 for Developers: From Novice to Professional
Beginning SQL Server 2008 for Developers: From Novice to Professional
SQL Server 2008 is a first–rate database management system. It offers more capability than any previous release of SQL Server. More than just a classic relational database management system, SQL Server 2008 includes exciting and powerful features that make it useful for everything from large corporate data warehouses to ad hoc departmental...
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)

Edward L. Haletky’s Complete, Solutions-Focused Guide to Running ESX Server 3.5, vSphere, and VMware 4.x

 

Extensively updated and revised, this is the definitive real-world guide to planning, deploying, and managing VMware ESX Server 3.5,...

unlimited object storage image
Result Page: 46 45 44 43 42 41 40 39 38 37 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy