-
Porting to the Symbian Platform: Open Mobile Development in C/C++
Author Mark Wilcox
If you want to write mobile applications without the idioms of Symbian C++, have existing software assets that you'd like to re-use on Symbian devices, or are an open source developer still waiting for an open Linux-based device to gain significant market penetrati....
Release Date 2009/11 -
Implementing Digital Forensic Readiness, 2nd Edition
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with....
Release Date 2019/05 -
Author Svetlana Ostrovskaya , Oleg Skulkin
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted wi....
Release Date 2022/03 -
Cyber Security and Digital Forensics
Author Mangesh M. Ghonge , Sabyasachi Pramanik , Ramchandra Mangrulkar , Dac-Nhuong Le
CYBER SECURITY AND DIGITAL FORENSICSCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.Cur....
Release Date 2022/03 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
Digital Forensics and Internet of Things
Author Anita Gehlot , Rajesh Singh , Jaskaran Singh , Neeta Raj Sharma
DIGITAL FORENSICS AND INTERNET OF THINGSIt pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to a....
Release Date 2022/04 -
Author Mohammed Moreb
Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investi....
Release Date 2022/04 -
Computer Forensics InfoSec Pro Guide
Author David Cowen
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Infor....
Release Date 2013/03 -
EnCE EnCase Computer Forensics: The Official EnCase Certified Examiner Study Guide, 3rd Edition
Author Steve Bunting
The official, Guidance Software-approved book on the newest EnCE exam!The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The o....
Release Date 2012/09 -
Author Todd Wade
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Release Date 2022/06 -
Extending Your Business to Mobile Devices with IBM Worklight
Author Susan Hanson , Leonardo Olivera , Kearan McPherson , Christian Kirsch , Hossam Kator
The mobile industry is evolving rapidly. An increasing number of mobile devices, such as smartphones and tablets, are sold every year and more people are accessing services from a mobile device than ever before. For an enterprise, this can mean that a growing number....
Release Date 2013/08 -
Author Jayson E Street
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the worl....
Release Date 2015/07 -
The Complete Idiot's Guide to Business Law
Author Cara C. Putman
The only guide of its kind! Undergraduate college students working toward business degrees, MBA graduate students, and first year law students have one thing in common: they need to take courses in business law. Unlike cumbersome and expensive textbooks, The Comple....
Release Date 2009/05 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03 -
Key Case Law Rules for Government Contract Formation
Author Patrick Butler
Go Beyond the FAR!The guidance contained in the almost 2000 pages of the Federal Acquisition Regulation and the various agency supplements are just a part of the resources government acquisition professionals need to do their jobs effectively. Accessing and un....
Release Date 2014/09 -
Bring Your Own Device - The mobile computing challenge
Author BCS , The Chartered Institute for IT
The increasing use of personal devices such as smartphones and tablets in the workplace at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to embrace the benefits of BYOD while offer....
Release Date 2013/05 -
Hacking Exposed Mobile Security Secrets & Solutions
Author Mike Price , John Steven , Scott Matsumoto , Swapnil Deshmukh , Sarath Geethakumar
Proven security tactics for today’s mobile apps,devices, and networks A great overview of the new threats created by mobile devices.The authors have heaps of experience in the topics and bring that to every chapter. Pro....
Release Date 2013/07 -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Author Ali Dehghantanha , Kim-Kwang Raymond Choo
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners an....
Release Date 2016/10 -
Author Brian T Contos
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist thre....
Release Date 2006/10 -
Implementing Digital Forensic Readiness
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organizati....
Release Date 2016/02 -
Author André Årnes
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical fieldWritten by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab)....
Release Date 2017/07 -
Learn Computer Forensics - Second Edition
Author William Oettinger
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collectedKey FeaturesInvestigate the core methods of computer forensics to procure and secure advanced digital evidence skillfullyRecord the digital evidence collected and....
Release Date 2022/07 -
Author Chad Udell
Discover the strategies, tools, and technologies necessary for developing successful mobile learning programsIn the modern, rapidly-expanding mobile learning environment, only clear guidelines and state-of-the-art technologies will stand up to the challenges that li....
Release Date 2014/10 -
Author Konstantin Sapronov , Ayman Shaaban
Leverage the power of digital forensics for Windows systemsAbout This BookBuild your own lab environment to analyze forensic data and practice techniques.This book offers meticulous coverage with an example-driven approach and helps you build the key skills of perf....
Release Date 2016/06 -
Author Wallace Jackson
This book is a brief primer covering concepts central to digital imagery, digital audio and digital illustration using open source software packages such as GIMP, Audacity and Inkscape. These are used for this book because they are free for commercial use. The book....
Release Date 2015/10 -
Complete Audio Mastering: Practical Techniques
Author Gebre E. Waddell
Learn the art of professional audio mastering"Gebre Waddell covers this all-important subject in greater depth than has ever been done in a book." -- Dave Collins, mastering engineer for The Nightmare Before Christmas, Jurassic Park, Soundgarden, War, Ben Harper, an....
Release Date 2013/07 -
Author Michelle Tillis LEDERMAN
We all know that networking is important, and that forming relationships with others is a vital part of success. But sometimes it seems like networking removes all emotions from the equation and focuses only on immediate goals…whereas the kind of relation....
Release Date 2011/09 -
Author Esther Swilley
Do you know anyone who does not own a mobile device? Consumers use mobile devices not only for communicating but for shopping as well. Searching for product information, inquiring about services, comparing prices, and purchasing make-up are just some of the shoppin....
Release Date 2015/11 -
Cyber Forensics: From Data to Digital Evidence
Author Albert J. Marcella , Frederic Guillossou
An explanation of the basic principles of dataThis book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operati....
Release Date 2012/05