Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices
SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices
What seems routine today was not always so. The field of Si-based heterostructures rests solidly on the shoulders of materials scientists and crystal growers, those purveyors of the semiconductor “black arts” associated with the deposition of pristine films of nanoscale dimensionality onto enormous Si wafers with near infinite...
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes...
Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Written by renowned experts Bob Keppel and William Birnes, this book focuses on analyzing crimes of violence to unveil common characteristics that might prove useful in the successful identification, apprehension, and conviction of murderers. It details the historical origins of modus operandi as an investigative tool and discusses modern...
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Combustion Processes in Propulsion: Control, Noise, and Pulse Detonation
Combustion Processes in Propulsion: Control, Noise, and Pulse Detonation
"This collection represents the current state-of-the-art in combustion research for air-breathing chemical propulsion. Nearly an equal mix of computational and experimental results are presented from the major players in Pulse Detonation Engines research, providing the reader with a thorough overview of the contemporary technical issues...
Designing the iPhone User Experience: A User-Centered Approach to Sketching and Prototyping iPhone Apps
Designing the iPhone User Experience: A User-Centered Approach to Sketching and Prototyping iPhone Apps

Given the fiercely competitive state of the iPhone app landscape, it has become increasingly challenging for app designers and developers to differentiate their apps. The days are long gone when it was possible to crank out an app over the weekend and refine it after receiving a few not so flattering user reviews....

Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Introduction to Simulink with Engineering Applications
Introduction to Simulink with Engineering Applications
    This text is an introduction to Simulink ®, a companion application to MATLAB ®. It is written for students at the undergraduate and graduate programs, as well as for the working professional. Although some previous knowledge of MATLAB would be helpful, it is not absolutely necessary; Appendix A of this text is an...
Foundation Actionscript 3.0 Animation: Making Things Move!
Foundation Actionscript 3.0 Animation: Making Things Move!
In this book, you'll learn
  • All the ActionScript 3.0 (including math and trigonometry functions) and Flash rendering techniques you'll need to start animating with code
  • Basic motion principles such as velocity, acceleration, friction, easing, and bouncing
  • How to handle user interaction via the keyboard and...
Slow Light: Science and Applications (Optical Science and Engineering)
Slow Light: Science and Applications (Optical Science and Engineering)

Exotic effects of slow light have been observed in the laboratory. But most currently available texts do not explore the wider field of slow light in photonic structures and optical fibers. Reflecting recent research, this book presents a comprehensive introduction to slow light and its potential applications, including storage, switching,...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy