 |
|
|
 Windows Forensic Analysis DVD Toolkit, Second Edition"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer
"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior... |  |  Video Games (Technology 360)The past few decades have seen some amazing advances in technology. Many of these changes have had a direct and measureable impact on the way people live, work, and play. Communication tools, such as cell phones, satellites, and the Internet, allow people to keep in constantcontact across longer distances and from the most remote places.... |  |  |
|
|
 3D Images of Materials Structures: Processing and AnalysisTaking and analyzing images of materials' microstructures is essential for quality control, choice and design of all kind of products. Today, the standard method still is to analyze 2D microscopy images. But, insight into the 3D geometry of the microstructure of materials and measuring its characteristics become more and more prerequisites in... |  |  Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting... |  |  Voice over IP SecurityVoice over IP Security
Security best practices derived from deep analysis of the latest VoIP network threats
Patrick Park
VoIP... |
|
Result Page: 685 684 683 682 681 680 679 678 677 676 675 674 673 672 671 670 669 668 667 |