Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.
Pyside GUI Application Development - Second Edition
Develop more dynamic and robust GUI applications using PySide, an open source cross-platform UI framework
About This Book
Designed for beginners to help you get started with GUI application development
Develop your own applications by creating customized widgets and dialogs
Practical Hive: A Guide to Hadoop's Data Warehouse System
Dive into the world of SQL on Hadoop and get the most out of your Hive data warehouses. This book is your go-to resource for using Hive: authors Scott Shaw, Ankur Gupta, David Kjerrumgaard, and Andreas Francois Vermeulen take you through learning HiveQL, the SQL-like language specific to Hive, to analyze, export, and massage the data stored...
Game Hacking: Developing Autonomous Bots for Online Games
You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.
Bring your knowledge of Windows-based development and memory management, and Game...
Fully updated to the latest CSS modules, make the journey to CSS mastery as simple and painless as possible. This book dives into advanced aspects of CSS-based design, such as responsive design, modular CSS, and CSS typography. Through a series of easy-to-follow tutorials, you will learn practical CSS techniques you can immediately start...
Learning Linux Binary Analysis
Grasp the intricacies of the ELF binary format of UNIX and Linux
Design tools for reverse engineering and binary forensic analysis
Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
|Result Page: Previous 27 28 29 30 31 32 33 34 35 Next |