computer forensics



Ed Tittel Computer Forensics JumpStart Ed Tittel Computer Forensics JumpStart Новинка

Ed Tittel Computer Forensics JumpStart

1912.46 руб.
Essential reading for launching a career in computer forensics Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field. Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crime Details the ways to conduct a computer forensics investigation Highlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witness Walks you through identifying, collecting, and preserving computer evidence Explains how to understand encryption and examine encryption files Computer Forensics JumpStart is the resource you need to launch a career in computer forensics.
Reynaldo Anzaldua Computer Forensics For Dummies Reynaldo Anzaldua Computer Forensics For Dummies Новинка

Reynaldo Anzaldua Computer Forensics For Dummies

2444.96 руб.
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to: Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents’ methods Handle passwords and encrypted data Work with the courts and win the case Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Shujun Li Handbook of Digital Forensics of Multimedia Data and Devices, Enhanced E-Book Shujun Li Handbook of Digital Forensics of Multimedia Data and Devices, Enhanced E-Book Новинка

Shujun Li Handbook of Digital Forensics of Multimedia Data and Devices, Enhanced E-Book

14200.39 руб.
Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializing in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others. Key features: Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices Offers not only explanations of techniques but also real-world and simulated case studies to illustrate how digital and multimedia forensics techniques work Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies
Andrew Case The Art of Memory Forensics. Detecting Malware and Threats in Windows, Linux, and Mac Memory Andrew Case The Art of Memory Forensics. Detecting Malware and Threats in Windows, Linux, and Mac Memory Новинка

Andrew Case The Art of Memory Forensics. Detecting Malware and Threats in Windows, Linux, and Mac Memory

4733.23 руб.
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.
Erik Laykin Investigative Computer Forensics. The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives Erik Laykin Investigative Computer Forensics. The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives Новинка

Erik Laykin Investigative Computer Forensics. The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives

6496.1 руб.
Having worked with Erik on some of the most challenging computer forensic investigations during the early years of this industry's formation as well as having competed with him earnestly in the marketplace…I can truly say that Erik is one of the unique pioneers of computer forensic investigations. He not only can distill complex technical information into easily understandable concepts, but he always retained a long-term global perspective on the relevancy of our work and on the impact of the information revolution on the social and business structures of tomorrow. —From the Foreword by James Gordon, Managing Director, Navigant Consulting, Inc. Get the knowledge you need to make informed decisions throughout the computer forensic investigation process Investigative Computer Forensics zeroes in on a real need felt by lawyers, jurists, accountants, administrators, senior managers, and business executives around the globe: to understand the forensic investigation landscape before having an immediate and dire need for the services of a forensic investigator. Author Erik Laykin—leader and pioneer of computer forensic investigations—presents complex technical information in easily understandable concepts, covering: A primer on computers and networks Computer forensic fundamentals Investigative fundamentals Objectives and challenges in investigative computer forensics E-discovery responsibilities The future of computer forensic investigations Get the knowledge you need to make tough decisions during an internal investigation or while engaging the capabilities of a computer forensic professional with the proven guidance found in Investigative Computer Forensics.
Douglas Lyle P. Forensics For Dummies Douglas Lyle P. Forensics For Dummies Новинка

Douglas Lyle P. Forensics For Dummies

1466.07 руб.
Understand the real-life science behind crime scene investigation Forensics For Dummies takes you inside the world of crime scene investigation to give you the low down on this exciting field. Written by a doctor and former Law & Order consultant, this guide will have you solving crimes along with your favorite TV shows in no time. From fingerprints and fibers to blood and ballistics, you'll walk through the processes that yield significant information from the smallest clues. You'll learn how Hollywood gets it wrong, and how real-world forensics experts work every day in fields as diverse as biology, psychology, anthropology, medicine, information technology, and more. If you're interested in a forensics career, you'll find out how to break in—and the education you'll need to do the type of forensics work that interests you the most. Written for the true forensics fan, this book doesn't shy away from the details; you'll learn what goes on at the morgue as you determine cause of death, and you'll climb into the mind of a killer as you learn how forensic psychologists narrow down the suspect list. Crime shows are entertaining, but the reality is that most forensics cases aren't wrapped up in an hour. This book shows you how it's really done, and the amazing technology and brilliant people that do it every day. Learn who does what, when they do it, and how it's done Discover the many fields involved in crime scene investigation Understand what really happens inside a forensics lab Examine famous forensics cases more intriguing than any TV show Forensic scientists work in a variety of environments and in many different capacities. If you think television makes it look interesting, just wait until you learn what it's really like! Forensics For Dummies takes you on a tour of the real-world science behind solving the case.
André Årnes Digital Forensics André Årnes Digital Forensics Новинка

André Årnes Digital Forensics

5825.52 руб.
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry. The author team comprises experts in digital forensics, cybercrime law, information security and related areas. Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology – and new ways of exploiting information technology – is brought on line, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in Digital Forensics has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years. Encompasses all aspects of the field, including methodological, scientific, technical and legal matters Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images Features real-word examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media Digital Forensics is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.
Melinda Merck Veterinary Forensics. Animal Cruelty Investigations Melinda Merck Veterinary Forensics. Animal Cruelty Investigations Новинка

Melinda Merck Veterinary Forensics. Animal Cruelty Investigations

8176.81 руб.
Veterinary Forensics, Second Edition is a practical reference on applying veterinary forensic findings in animal cruelty cases. Now providing a greater focus on findings in animals, the second edition continues to offer guidance with more detailed information on crime scene investigation, forensic testing and findings, handling evidence, and testifying in court. Key changes to the new edition include new chapters on abuse in large animals, poultry, and birds; a standalone chapter on entomology; a new section on large scale cruelty investigation; an expanded section on pain and suffering; more pathology information; and more photos, forms, and information throughout. Logs and workbooks from the book are available on a companion website at www.wiley.com/go/vetforensics, allowing readers to download, customize, and use these forms in forensics investigations. Veterinary Forensics is an essential resource for veterinarians, pathologists, attorneys, and investigators working on animal abuse cases.
Titus A. M. Msagati Food Forensics and Toxicology Titus A. M. Msagati Food Forensics and Toxicology Новинка

Titus A. M. Msagati Food Forensics and Toxicology

14563.79 руб.
A comprehensive guide, offering a toxicological approach to food forensics, that reviews the legal, economic, and biological issues of food fraud Food Forensics and Toxicology offers an introduction and examination of forensics as applied to food and foodstuffs. The author puts the focus on food adulteration and food fraud investigation. The text combines the legal/economic issues of food fraud with the biological and health impacts of consuming adulterated food. Comprehensive in scope, the book covers a wide-range of topics including food adulteration/fraud, food «fingerprinting» and traceability, food toxicants in the body, and the accidental or deliberate introduction of toxicants into food products. In addition, the author includes information on the myriad types of toxicants from a range of food sources and explores the measures used to identify and quantify their toxicity. This book is designed to be a valuable reference source for laboratories, food companies, regulatory bodies, and researchers who are dealing with food adulteration, food fraud, foodborne illness, micro-organisms, and related topics. Food Forensics and Toxicology is the must-have guide that: Takes a comprehensive toxicological approach to food forensics Combines the legal/economic issue of food fraud with the biological/health impacts of consuming adulterated food in one volume Discusses a wide range of toxicants (from foods based on plants, animals, aquatic and other sources) Provides an analytical approach that details a number of approaches and the optimum means of measuring toxicity in foodstuffs Food Forensics and Toxicology gives professionals in the field a comprehensive resource that joins information on the legal/economic issues of food fraud with the biological and health implications of adulterated food.
Ric Messier Network Forensics Ric Messier Network Forensics Новинка

Ric Messier Network Forensics

3821.24 руб.
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light. Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need. Investigate packet captures to examine network communications Locate host-based artifacts and analyze network logs Understand intrusion detection systems—and let them do the legwork Have the right architecture and systems in place ahead of an incident Network data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.
Steve Bunting Mastering Windows Network Forensics and Investigation Steve Bunting Mastering Windows Network Forensics and Investigation Новинка

Steve Bunting Mastering Windows Network Forensics and Investigation

3820.6 руб.
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book–aimed at law enforcement personnel, prosecutors, and corporate investigators–provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response Walks you through ways to present technically complicated material in simple terms that will hold up in court Features content fully updated for Windows Server 2008 R2 and Windows 7 Covers the emerging field of Windows Mobile forensics Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes.
Angus Marshall McKenzie Digital Forensics. Digital Evidence in Criminal Investigations Angus Marshall McKenzie Digital Forensics. Digital Evidence in Criminal Investigations Новинка

Angus Marshall McKenzie Digital Forensics. Digital Evidence in Criminal Investigations

14364.03 руб.
The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidential data which may be recoverable from a range of devices, considering issues relating to reliability and usefulness of those data. Includes worked case examples, test questions and review quizzes to enhance student understanding Solutions provided in an accompanying website Includes numerous case studies throughout to highlight how digital evidence is handled at the crime scene and what can happen when procedures are carried out incorrectly Considers digital evidence in a broader context alongside other scientific evidence Discusses the role of digital devices in criminal activities and provides methods for the evaluation and prioritizing of evidence sources Includes discussion of the issues surrounding modern digital evidence examinations, for example; volume of material and its complexity Clear overview of all types of digital evidence Digital Forensics: Digital Evidence in Criminal Investigations is an invaluable text for undergraduate students taking either general forensic science courses where digital forensics may be a module or a dedicated computer/digital forensics degree course. The book is also a useful overview of the subject for postgraduate students and forensic practitioners.
Huffman Jane E. Wildlife Forensics. Methods and Applications Huffman Jane E. Wildlife Forensics. Methods and Applications Новинка

Huffman Jane E. Wildlife Forensics. Methods and Applications

13446.94 руб.
Wildlife Forensics: Methods and Applications provides an accessible and practical approach to the key areas involved in this developing subject. The book contains case studies throughout the text that take the reader from the field, to the lab analysis to the court room, giving a complete insight into the path of forensic evidence and demonstrating how current techniques can be applied to wildlife forensics. The book contains approaches that wildlife forensic investigators and laboratory technicians can employ in investigations and provides the direction and practical advice required by legal and police professionals seeking to gain the evidence needed to prosecute wildlife crimes. The book will bring together in one text various aspects of wildlife forensics, including statistics, toxicology, pathology, entomology, morphological identification, and DNA analysis. This book will be an invaluable reference and will provide investigators, laboratory technicians and students in forensic Science/conservation biology classes with practical guidance and best methods for criminal investigations applied to wildlife crime. Includes practical techniques that wildlife forensic investigators and laboratory technicians can employ in investigations. Includes case studies to illustrate various key methods and applications. Brings together diverse areas of forensic science and demonstrates their application specifically to the field of wildlife crime. Contains methodology boxes to lead readers through the processes of individual techniques. Takes an applied approach to the subject to appeal to both students of the subject and practitioners in the field. Includes a broad introduction to what is meant by 'wildlife crime', how to approach a crime scene and collect evidence and includes chapters dedicated to the key techniques utilized in wildlife investigations. Includes chapters on wildlife forensic pathology; zooanthropological techniques; biological trace evidence analysis; the importance of bitemark evidence; plant and wildlife forensics; best practices and law enforcement.
Quanta Computer Inc. Quanta Computer Inc. Новинка

Quanta Computer Inc.

130686 руб.
Quanta Computer Inc. Quanta Computer Inc. Новинка

Quanta Computer Inc.

6992 руб.
Quanta Computer Inc. Quanta Computer Inc. Новинка

Quanta Computer Inc.

6762 руб.
Quanta Computer Inc. Quanta Computer Inc. Новинка

Quanta Computer Inc.

118163 руб.
Quanta Computer Inc. Quanta Computer Inc. Новинка

Quanta Computer Inc.

147361 руб.
Quanta Computer Inc. Quanta Computer Inc. Новинка

Quanta Computer Inc.

10902 руб.
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

1225 руб.
Футболка Wearcraft Premium Slim Fit — цвет: БЕЛЫЙ, пол: МУЖ. A famous quote from Star Trek reimagined in a computer dystopia
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

1025 руб.
Лонгслив — цвет: БЕЛЫЙ, пол: МУЖ. A famous quote from Star Trek reimagined in a computer dystopia
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

858 руб.
Футболка Wearcraft Premium — цвет: БЕЛЫЙ, пол: ЖЕН. A famous quote from Star Trek reimagined in a computer dystopia
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

2264 руб.
Толстовка Wearcraft Premium унисекс — цвет: БЕЛЫЙ, пол: МУЖ. A famous quote from Star Trek reimagined in a computer dystopia
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

726 руб.
Майка классическая — цвет: БЕЛЫЙ, пол: ЖЕН. A famous quote from Star Trek reimagined in a computer dystopia
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

726 руб.
Майка классическая — цвет: БЕЛЫЙ, пол: МУЖ. A famous quote from Star Trek reimagined in a computer dystopia
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

518 руб.
Сумка — цвет: БЕЛЫЙ. A famous quote from Star Trek reimagined in a computer dystopia
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

890 руб.
Футболка классическая — цвет: БЕЛЫЙ, пол: МУЖ, качество: ЭКОНОМ. A famous quote from Star Trek reimagined in a computer dystopia
Printio Hello, computer Printio Hello, computer Новинка

Printio Hello, computer

890 руб.
Футболка классическая — цвет: БЕЛЫЙ, пол: ЖЕН. A famous quote from Star Trek reimagined in a computer dystopia
Atsushi Imiya Computer Vision in Vehicle Technology. Land, Sea, and Air Atsushi Imiya Computer Vision in Vehicle Technology. Land, Sea, and Air Новинка

Atsushi Imiya Computer Vision in Vehicle Technology. Land, Sea, and Air

8010.09 руб.
A unified view of the use of computer vision technology for different types of vehicles Computer Vision in Vehicle Technology focuses on computer vision as on-board technology, bringing together fields of research where computer vision is progressively penetrating: the automotive sector, unmanned aerial and underwater vehicles. It also serves as a reference for researchers of current developments and challenges in areas of the application of computer vision, involving vehicles such as advanced driver assistance (pedestrian detection, lane departure warning, traffic sign recognition), autonomous driving and robot navigation (with visual simultaneous localization and mapping) or unmanned aerial vehicles (obstacle avoidance, landscape classification and mapping, fire risk assessment). The overall role of computer vision for the navigation of different vehicles, as well as technology to address on-board applications, is analysed. Key features: Presents the latest advances in the field of computer vision and vehicle technologies in a highly informative and understandable way, including the basic mathematics for each problem. Provides a comprehensive summary of the state of the art computer vision techniques in vehicles from the navigation and the addressable applications points of view. Offers a detailed description of the open challenges and business opportunities for the immediate future in the field of vision based vehicle technologies. This is essential reading for computer vision researchers, as well as engineers working in vehicle technologies, and students of computer vision.
Sridhar Ramamoorti A.B.C.'s of Behavioral Forensics. Applying Psychology to Financial Fraud Prevention and Detection Sridhar Ramamoorti A.B.C.'s of Behavioral Forensics. Applying Psychology to Financial Fraud Prevention and Detection Новинка

Sridhar Ramamoorti A.B.C.'s of Behavioral Forensics. Applying Psychology to Financial Fraud Prevention and Detection

3821.24 руб.
Get practical insights on the psychology of white-collar criminals—and how to outsmart them Understand how the psychologies of fraudsters and their victims interact as well as what makes auditors/investigators/regulators let down their guard. Learn about the psychology of fraud victims, including boards of directors and senior management, and what makes them want to believe fraudsters, and therefore making them particularly vulnerable to deception. Just as IT experts gave us computer forensics, we now have a uniquely qualified team immersed in psychology, sociology, psychiatry as well as accounting and auditing, introducing the emerging field of behavioral forensics to address the phenomenon of fraud. Ever wonder what makes a white-collar criminal tick? Why does she or he do what they do? For the first time ever, see the mind of the fraudster laid bare, including their sometimes twisted rationalizations; think like a crook to catch a crook! The A.B.C.'s of Behavioral Forensics takes you there, with expert advice from a diverse but highly specialized authoring team of professionals (three out of the four are Certified Fraud Examiners): a former accounting firm partner who has a PhD in psychology, a former FBI special agent who has been with investigative practices of two of the Big Four firms, an industrial psychiatrist who has worked closely with the C-level suite of large and small companies, and an accounting professor who has interviewed numerous convicted felons. Along with a fascinating exploration of what makes people fall for the common and not-so-common swindles, the book provides a sweeping characterization of the ecology of fraud using The A.B.C.'s of Behavioral Forensics paradigm: the bad Apple (rogue executive), the bad Bushel (groups that collude and behave like gangs), and the bad Crop (representing organization-wide or even societally-sanctioned cultures that are toxic and corrosive). The book will make you take a longer look when hiring new employees and offers a deeper more complex understanding of what happens in organizations and in their people. The A.B.C. model will also help those inside and outside organizations inoculate against fraud and make you reflect on instilling the core values of your organization among your people and create a culture of excellence and integrity that acts as a prophylactic against fraud. Ultimately, you will discover that, used wisely, behavioral methods trump solely economic incentives. With business fraud on the rise globally, The A.B.C.'s of Behavioral Forensics is the must-have book for investigators, auditors, the C-suite and risk management professionals, the boards of directors, regulators, and HR professionals. Examines the psychology of fraud in a practical way, relating it to aspects of fraud prevention, deterrence, detection, and remediation Helps you understand that trust violation—the essence of fraud—is a betrayal of behavioral assumptions about «trusted» people Explains how good people go bad and how otherwise honest people cross the line Underscores the importance of creating a culture of excellence and integrity that inoculates an organization from fraud risk (i.e., honest behavior pays, while dishonesty is frowned upon) Provides key takeaways on what to look for when hiring new employees and in your current employees, as well as creating and maintaining a culture of control consciousness Includes narrative accounts of interviews with convicted white-collar criminals, as well as interpretive insights and analysis of their rationalizations Furnishes ideas about how to enhance professional skepticism, how to resist fraudsters, how to see through their schemes, how to infuse internal controls with the people/behavioral element, and make them more effective in addressing behav
Frederic Guillossou Cyber Forensics. From Data to Digital Evidence Frederic Guillossou Cyber Forensics. From Data to Digital Evidence Новинка

Frederic Guillossou Cyber Forensics. From Data to Digital Evidence

5094.98 руб.
An explanation of the basic principles of data This book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies. The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information. It inlcudes practical examples and illustrations throughout to guide the reader.
Steve Bunting EnCase Computer Forensics -- The Official EnCE. EnCase Certified Examiner Study Guide Steve Bunting EnCase Computer Forensics -- The Official EnCE. EnCase Certified Examiner Study Guide Новинка

Steve Bunting EnCase Computer Forensics -- The Official EnCE. EnCase Certified Examiner Study Guide

4457.47 руб.
The official, Guidance Software-approved book on the newest EnCE exam! The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The only official Guidance-endorsed study guide on the topic, this book prepares you for the exam with extensive coverage of all exam topics, real-world scenarios, hands-on exercises, up-to-date legal information, and sample evidence files, flashcards, and more. Guides readers through preparation for the newest EnCase Certified Examiner (EnCE) exam Prepares candidates for both Phase 1 and Phase 2 of the exam, as well as for practical use of the certification Covers identifying and searching hardware and files systems, handling evidence on the scene, and acquiring digital evidence using EnCase Forensic 7 Includes hands-on exercises, practice questions, and up-to-date legal information Sample evidence files, Sybex Test Engine, electronic flashcards, and more If you're preparing for the new EnCE exam, this is the study guide you need.
Michael Ligh Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code Michael Ligh Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code Новинка

Michael Ligh Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code

3820.6 руб.
A computer forensics «how-to» for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
Printio Rust. the computer game Printio Rust. the computer game Новинка

Printio Rust. the computer game

1250 руб.
Футболка классическая — цвет: ЧЁРНЫЙ, пол: ЖЕН. Футболка с логотипом игры-выживания Rust. Довольно популярной в наши дни.
Printio Rust. the computer game Printio Rust. the computer game Новинка

Printio Rust. the computer game

1240 руб.
Лонгслив — цвет: ЧЁРНЫЙ, пол: МУЖ. Футболка с логотипом игры-выживания Rust. Довольно популярной в наши дни.
Digital Design Manual Digital Design Manual Новинка

Digital Design Manual

4710 руб.
In architecture and interior design spatial concepts are increasingly computer-generated, illustrated and presented. Computer aided design has already established in...
Ledley Robert S. Computer Architecture and Security. Fundamentals of Designing Secure Computer Systems Ledley Robert S. Computer Architecture and Security. Fundamentals of Designing Secure Computer Systems Новинка

Ledley Robert S. Computer Architecture and Security. Fundamentals of Designing Secure Computer Systems

9476.67 руб.
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace. Examination of memory, CPU architecture and system implementation Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Design and implementation of a patent-pending secure computer system Includes the latest patent-pending technologies in architecture security Placement of computers in a security fulfilled network environment Co-authored by the inventor of the modern Computed Tomography (CT) scanner Provides website for lecture notes, security tools and latest updates
P.M. Kartoffeln und Computer P.M. Kartoffeln und Computer Новинка
Peter Gregory H. Computer Viruses For Dummies Peter Gregory H. Computer Viruses For Dummies Новинка

Peter Gregory H. Computer Viruses For Dummies

1147.22 руб.
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you: Understand the risks and analyze your PC’s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it’s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you’re surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs. Remember, if you don’t protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.
Theo Gevers Color in Computer Vision. Fundamentals and Applications Theo Gevers Color in Computer Vision. Fundamentals and Applications Новинка

Theo Gevers Color in Computer Vision. Fundamentals and Applications

8884.05 руб.
While the field of computer vision drives many of today’s digital technologies and communication networks, the topic of color has emerged only recently in most computer vision applications. One of the most extensive works to date on color in computer vision, this book provides a complete set of tools for working with color in the field of image understanding. Based on the authors’ intense collaboration for more than a decade and drawing on the latest thinking in the field of computer science, the book integrates topics from color science and computer vision, clearly linking theories, techniques, machine learning, and applications. The fundamental basics, sample applications, and downloadable versions of the software and data sets are also included. Clear, thorough, and practical, Color in Computer Vision explains: Computer vision, including color-driven algorithms and quantitative results of various state-of-the-art methods Color science topics such as color systems, color reflection mechanisms, color invariance, and color constancy Digital image processing, including edge detection, feature extraction, image segmentation, and image transformations Signal processing techniques for the development of both image processing and machine learning Robotics and artificial intelligence, including such topics as supervised learning and classifiers for object and scene categorization Researchers and professionals in computer science, computer vision, color science, electrical engineering, and signal processing will learn how to implement color in computer vision applications and gain insight into future developments in this dynamic and expanding field.
М. В. Слива Содержательный аспект международного стандарта образования в области Computer Science М. В. Слива Содержательный аспект международного стандарта образования в области Computer Science Новинка

М. В. Слива Содержательный аспект международного стандарта образования в области Computer Science

79.9 руб.
В статье рассматривается международный стандарт образования Computer Science Curricula 2013, история его развития, анализируется его содержание и структура, производится сравнение с российским стандартом-аналогом – направлением бакалавриата «Информатика и вычислительная техника», делается сопоставление содержательного аспекта двух стандартов в виде сравнения изучаемых дисциплин. Особое внимание уделено требованиям к выпускникам в области Computer Science по международному стандарту.
Yamin Li Computer Principles and Design in Verilog HDL Yamin Li Computer Principles and Design in Verilog HDL Новинка

Yamin Li Computer Principles and Design in Verilog HDL

9467.16 руб.
Uses Verilog HDL to illustrate computer architecture and microprocessor design, allowing readers to readily simulate and adjust the operation of each design, and thus build industrially relevant skills Introduces the computer principles, computer design, and how to use Verilog HDL (Hardware Description Language) to implement the design Provides the skills for designing processor/arithmetic/cpu chips, including the unique application of Verilog HDL material for CPU (central processing unit) implementation Despite the many books on Verilog and computer architecture and microprocessor design, few, if any, use Verilog as a key tool in helping a student to understand these design techniques A companion website includes color figures, Verilog HDL codes, extra test benches not found in the book, and PDFs of the figures and simulation waveforms for instructors

кешбака
Страницы:


Get practical insights on the psychology of white-collar criminals—and how to outsmart them Understand how the psychologies of fraudsters and their victims interact as well as what makes auditors/investigators/regulators let down their guard. Learn about the psychology of fraud victims, including boards of directors and senior management, and what makes them want to believe fraudsters, and therefore making them particularly vulnerable to deception. Just as IT experts gave us computer forensics, we now have a uniquely qualified team immersed in psychology, sociology, psychiatry as well as accounting and auditing, introducing the emerging field of behavioral forensics to address the phenomenon of fraud. Ever wonder what makes a white-collar criminal tick? Why does she or he do what they do? For the first time ever, see the mind of the fraudster laid bare, including their sometimes twisted rationalizations; think like a crook to catch a crook! The A.B.C.'s of Behavioral Forensics takes you there, with expert advice from a diverse but highly specialized authoring team of professionals (three out of the four are Certified Fraud Examiners): a former accounting firm partner who has a PhD in psychology, a former FBI special agent who has been with investigative practices of two of the Big Four firms, an industrial psychiatrist who has worked closely with the C-level suite of large and small companies, and an accounting professor who has interviewed numerous convicted felons. Along with a fascinating exploration of what makes people fall for the common and not-so-common swindles, the book provides a sweeping characterization of the ecology of fraud using The A.B.C.'s of Behavioral Forensics paradigm: the bad Apple (rogue executive), the bad Bushel (groups that collude and behave like gangs), and the bad Crop (representing organization-wide or even societally-sanctioned cultures that are toxic and corrosive). The book will make you take a longer look when hiring new employees and offers a deeper more complex understanding of what happens in organizations and in their people. The A.B.C. model will also help those inside and outside organizations inoculate against fraud and make you reflect on instilling the core values of your organization among your people and create a culture of excellence and integrity that acts as a prophylactic against fraud. Ultimately, you will discover that, used wisely, behavioral methods trump solely economic incentives. With business fraud on the rise globally, The A.B.C.'s of Behavioral Forensics is the must-have book for investigators, auditors, the C-suite and risk management professionals, the boards of directors, regulators, and HR professionals. Examines the psychology of fraud in a practical way, relating it to aspects of fraud prevention, deterrence, detection, and remediation Helps you understand that trust violation—the essence of fraud—is a betrayal of behavioral assumptions about «trusted» people Explains how good people go bad and how otherwise honest people cross the line Underscores the importance of creating a culture of excellence and integrity that inoculates an organization from fraud risk (i.e., honest behavior pays, while dishonesty is frowned upon) Provides key takeaways on what to look for when hiring new employees and in your current employees, as well as creating and maintaining a culture of control consciousness Includes narrative accounts of interviews with convicted white-collar criminals, as well as interpretive insights and analysis of their rationalizations Furnishes ideas about how to enhance professional skepticism, how to resist fraudsters, how to see through their schemes, how to infuse internal controls with the people/behavioral element, and make them more effective in addressing behav
Продажа computer forensics лучших цены всего мира
Посредством этого сайта магазина - каталога товаров мы очень легко осуществляем продажу computer forensics у одного из интернет-магазинов проверенных фирм. Определитесь с вашими предпочтениями один интернет-магазин, с лучшей ценой продукта. Прочитав рекомендации по продаже computer forensics легко охарактеризовать производителя как превосходную и доступную фирму.