Books 171
Books
Year published
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential...
Books 241
Books
Year published
Developing a knowledge model helps to formalize the difficult task of analyzing crime incidents in addition to preserving and...
Books 117
Books
Year published
This reference reprints with corrections, additional comments, and classification more than 370 alphabetically arranged and cross-referenced memory analysis patterns...
Books 111
Books
Year published
Digital forensics is the branch of forensic science that analyzes, examines, identifies as well as recovers the digital evidence...
Books 106
Books
Year published
If you love technology and you’re looking for a job with high pay and a robust occupational outlook, you’re...
Books 117
Books
Year published
If you love technology and you’re looking for a job with high pay and a robust occupational outlook, you’re...
Books 113
Books
Year published
Many Wonders what is exactly the requirement to excel in IT career. Also, many software learners need the curiosity...
Books 113
Books
Year published
This Certified Forensic Computer Examiner Guide is unlike books you're used to. If you're looking for a textbook, this...
Books 110
Books
Year published
If you are searching for positions in IT, it's helpful to take a look at a broad list of...
Books 159
Books
Year published
This Computer Forensics Guide is unlike books you're used to. If you're looking for a textbook, this might not...
How I Passed EC-Council Computer Hacking Forensic Investigator (CHFI) Exam: Successfully Proven Tips Hot
Books 111
Books
Year published
If you fail the exam, you will lose not only money, but also the valuable time. Have you ever...
Books 127
Books
Year published
Discover how the internals of malware work and how you can analyze and detect it. You will learn not...
Books 120
Books
Year published
Digital Audio Forensics Fundamentals offers an accessible introduction to both the theory and practical skills behind this emerging field...
Information Security Policies, Procedures, and Standards: A Practitioner's Reference 1st Edition Hot
Books 105
Books
Year published
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information...
Books 124
Books
Year published
It is very common phenomenon that real time knowledge on any IT technology level will make you not only...
Blockchain Technology and Applications (River Publishers Series in Security and Digital Forensics) Hot
Books 221
Books
Year published
Blockchain is an emerging technology that can radically improve transactions security at banking, supply chain, and other transaction networks....
Books 242
Books
Year published
The foundational guide for using deception against computer network adversaries. When an attacker breaks into your network, you have...
Books 234
Books
Year published
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will...
Books 246
Books
Year published
Practical Guide to Digital Forensics Investigations, A (Pearson IT Cybersecurity Curriculum (ITCC)) 2nd Edition
Books 234
Books
Year published
This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by...