-
Digital Forensics with Kali Linux
Author Shiva V.N. Parasram
Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guideAbout This BookMaster powerful Kali Linux tools for digital investigation and analysisPerform evidence acquisition, preservation, and analys....
Release Date 2017/12 -
Digital Forensics Trial Graphics
Author Lars Daniel , John Sammons
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technolog....
Release Date 2017/03 -
Digital Forensics for Legal Professionals
Author Lars Daniel , Larry Daniel
Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors’ years of experience in working with attorneys as digital forensics experts, common questions arise again....
Release Date 2011/10 -
Digital Forensics Basics: A Practical Guide Using Windows OS
Author Nihad A. Hassan
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gat....
Release Date 2019/02 -
Digital Forensics and Internet of Things
Author Anita Gehlot , Rajesh Singh , Jaskaran Singh , Neeta Raj Sharma
DIGITAL FORENSICS AND INTERNET OF THINGSIt pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to a....
Release Date 2022/04 -
Digital Forensics and Incident Response - Third Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threatsKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyLearn to apply digital forensics tools ....
Release Date 2022/12 -
Digital Forensics and Incident Response - Second Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident r....
Release Date 2020/01 -
Digital Forensics and Incident Response
Author Gerard Johansen
A practical guide to deploying digital forensic techniques in response to cyber security incidentsAbout This BookLearn incident response fundamentals and create an effective incident response frameworkMaster forensics investigation utilizing digital investigative t....
Release Date 2017/07 -
Author John Sammons
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad rang....
Release Date 2015/12 -
Author André Årnes
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical fieldWritten by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab)....
Release Date 2017/07 -
Digital Filmmaking, 2nd Edition
Author Natalie Phillips , Thomas Ohanian
Digital Filmmaking has been called the bible for professional filmmakers in the digital age. It details all of the procedural, creative, and technical aspects of pre-production, production, and post-production within a digital filmmaking environment. It exami....
Release Date 2013/04 -
Digital Earth - Cyber threats, privacy and ethics in an age of paranoia
Author Sarah Katz
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Release Date 2022/04 -
Author Paul Wheeler
High end digital cinematography can truly challenge the film camera in many of the technical, artistic and emotional aspects of what we think of as 'cinematography'. This book is a guide for practising and aspiring cinematographers and DOPs to digital cinema....
Release Date 2013/05 -
Digital Audio Editing Fundamentals
Author Wallace Jackson
This concise book builds upon the foundational concepts of MIDI, synthesis, and sampled waveforms. It also covers key factors regarding the data footprint optimization work process, streaming versus captive digital audio new media assets, digital audio programming a....
Release Date 2015/12 -
Author 3dtotal. 3dtotal.Com
Meet some of the finest 2D and 3D artists working in the industry today and discover how they create some of the most innovative digital art in the world. More than a gallery book or a coffee table book- Digital Art Masters Volume 5 includes over 50 artists and 900 ....
Release Date 2012/11 -
Author 3dtotal. 3dtotal.Com
Meet some of the finest 2D and 3D artists working in the industry today and discover how they create some of the most innovative digital art in the world. More than a gallery book or a coffee table book- Digital Art Masters Volume 4 includes over 50 artists an....
Release Date 2012/10 -
Digital Archaeology: The Art and Science of Digital Forensics
Author Michael W. Graves
The Definitive, Up-to-Date Guide to Digital ForensicsThe rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital Archaeology, expert practitioner Michael Graves has writt....
Release Date 2013/08 -
Author Kashmiri L. Mittal , Rajiv Kohli
Developments in Surface Contamination and Cleaning, Volume Ten, provides a state-of-the-art guide to the current knowledge on the behavior of film-type and particulate surface contaminants and their cleaning methods. This newest volume in the series discusses mecha....
Release Date 2016/11 -
Developmental Assignments: Creating Learning Experiences Without Changing Jobs
Author Cynthia D McCauley
This book is modeled after "Eighty-eight Assignments for Development in Place," one of CCL's most popular publications. In the years since that report was published, we have learned more about development in place--from research, from working with managers and org....
Release Date 2006/02 -
Developing the Next Generation of Enterprise Leaders
Author M. Ellen Peebles , Douglas Ready
A survey of top business executives from major international organizations found that 79% said it was extremely important to have leaders who act on behalf of the entire organization, not just their units. The rest said it was very important. Nearly 65% said they e....
Release Date 2015/10 -
Author Patti Shank
To determine if needed results have been achieved, results are often measured and assessed against a predefined set of standards. In instructional design-speak, these standards are commonly known as learning objectives, which should be based on what learners actuall....
Release Date 2009/12 -
Detecting and Combating Malicious Email
Author Cade Kamachi , Julie JCH Ryan
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully au....
Release Date 2014/10 -
Designing Trustworthy Organizations
Author Robert F. Hurley , Nicole Gillespie , Donald L. Ferrin , Graham Dietz
In the aftermath of the well-publicized frauds of Enron, WorldCom and Tyco circa 2001 and 2002, there were major efforts in the United States to restore trust and enforce corporate compliance. Among other things, the U.S. Congress passed the Sarbanes-Oxley Act ....
Release Date 2013/07 -
Author Tom Clark
Designing Storage Area Networks, Second Edition, succinctly captures the key technologies that are driving the storage networking industry. Tom Clark's works are helping to educate the IT community to the benefits and challenges of shared storage and are recommende....
Release Date 2003/03 -
Designing Network Security Second Edition
Author Merike Kaeo
A practical guide to creating a secure network infrastructureUnderstand basic cryptography and security technologiesIdentify the threats and common attacks to a network infrastructureLearn how to create a security policyFind out how to recover from a security breach....
Release Date 2003/10 -
Designing Menus with Encore DVD
Author John Skidgel
Designed to complement the Encore DVD software documentation, this full-color book begins with a brief description of the DVD specification, then introduces readers to DVD authoring concepts such as menu creation, timeline construction, navigation, transcoding,....
Release Date 2012/11 -
Author Joshua Porter
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the righ....
Release Date 2008/04 -
Author Gretchen Anderson
Designers of all stripes today are seeking social and civic projects that have a mission to serve the greater good at their core. Part of this growing trend stems from the desire to use skills for their highest potential. But the real payoff is the ability to use n....
Release Date 2015/06 -
Author Donald D. Dunn
Executive leaders need a framework with which to evaluate current and to create new corporate ethical management systems in their organizations. This book offers such a framework, called the Moldable Model©, a system of consistent components that give leaders ....
Release Date 2016/05 -
Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter
Author Lucian Gheorghe
Learn how to secure your system and implement QoS using real-world scenarios for networks of all sizesImplementing Packet filtering, NAT, bandwidth shaping, packet prioritization using netfilter/iptables, iproute2, Class Based Queuing (CBQ) and Hierarchical Token Bu....
Release Date 2006/10