- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2
Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2 includes contents: Chapter 10: router forensics and network forensics; chapter 11: investigating wireless attacks; chapter 12: PDA, blackberry, and ipod forensics; chapter 13: forensic softwareand hardware; chapter 14: forensics investigation using encase; chapter 15: incident response; chapter 16: types of investigations; appendix a: becoming an expert...
471 p actvn 26/03/2024 10 0
Từ khóa: The official CHFI, Computer hacking forensics investigators, Computer hacking, Network forensics, Investigating wireless attacks, Forensic softwareand hardware
Ebook Forensic computer crime investigation
Ebook "Forensic computer crime investigation" includes contents: Chapter 1: computer crime and the electronic crime scene; chapter 2: the digital investigative unit: staffing, training, and issues; chapter 3: criminal investigation analysis and behavior: characteristics of computer criminals; chapter 4: investigative strategy and utilities; chapter 5: computer forensics & investigation: the training organization; chapter 6: internet crimes...
338 p actvn 26/03/2024 8 0
Từ khóa: Forensic computer crime investigation, Computer crime, Forensic computer crime, The electronic crime scene, The digital investigative, Characteristics of computer criminals
Ebook Forensic computing: A practitioners guide (Second edition)
Ebook Forensic computing: A practitioners guide (Second edition) includes contents: Chapter 1 forensic computing, chapter 2 understanding information, chapter 3 IT systems concepts, chapter 4 PC hardware and inside the box, chapter 5 disk geometry, chapter 6 the new technology file system, chapter 7 the treatment of pcs, chapter 8 the treatment of electronic organizers, chapter 9 looking ahead (just a little bit more).
464 p actvn 26/03/2024 10 0
Từ khóa: Ebook Forensic computing, Forensic computing, IT systems concepts, PC hardware, Disk geometry, The new technology file system
Ebook EnCase computer forensics - The official EnCE: EnCase certified examiner (Second edition): Part 2 includes contents: Chapter 7 understanding, searching for, and bookmarking data; chapter 8 file signature analysis and hash analysis; chapter 9 windows operating system artifacts; chapter 10 advanced encase; appendix A creating paperless reports; appendix B about the companion DVD.
342 p actvn 27/02/2024 16 0
Từ khóa: EnCase computer forensics, The official EnCE, EnCase certified examiner, Bookmarking data, File signature analysis, Windows operating system artifacts
Ebook EnCase computer forensics - The official EnCE: EnCase certified examiner (Second edition): Part 1 includes contents: Chapter 1 computer hardware, chapter 2 file systems, chapter 3 first response, chapter 4 acquiring digital evidence, chapter 5 encase concepts, chapter 6 encase environment.
309 p actvn 27/02/2024 14 0
Từ khóa: EnCase computer forensics, The official EnCE, EnCase certified examiner, Computer hardware, File systems, Acquiring digital evidence
Ebook The little black book of computer viruses (Volume one: The basic technology)
Ebook The little black book of computer viruses (Volume one: The basic technology) includes contents: The basics of the computer virus, a simple COM file infector, a sophisticated executable virus, a simple boot sector virus, a sophisticated boot sector virus.
183 p actvn 26/01/2024 20 0
Từ khóa: The little black book of computer viruses, Computer viruses, COM File Infector, Infecting an EXE File, Persistent File Search Mechanism, Copy Mechanism
Ebook The giant black book of computer viruses
Ebook "The giant black book of computer viruses" includes content: Computer virus basics, the simplest com infector, companion viruses, parasitic com infectors, a memory resident virus, infecting exe files, advamced memory residence techniques, an introduction to boot sector viruses, the most successful boot sector virus, advanced boot sector techniques multi partite viruses, infecting device drivers windows viruses,... and other contents.
660 p actvn 26/01/2024 15 0
Từ khóa: The giant black book, Computer viruses, Computer virus basics, The simplest com infector, Infecting exe files, Advamced memory residence techniques, Multi partite viruses
Ebook The web application hackers handbook - Discovering and exploiting security flaws
Ebook "The web application hackers handbook - Discovering and exploiting security flaws" includes content: Web application (In)security, core defense mechanisms, web application technologies, mapping the application, bypassing client side controls, attacking authentication, attacking session management, attacking access controls, injecting code, exploiting path traversal,... and other contents.
771 p actvn 25/12/2023 17 0
Từ khóa: The web application hackers handbook, Security measures, Computer security, Core defense mechanisms, Web application technologies, Mapping the application
Ebook Intelligent control systems using soft computing methodologies
This volume constitutes a report on the principal elements and important applications of soft computing as reported from some of the active members of this community. In its chapters, the book gives a prime introduction to soft computing with its principal components of fuzzy logic, neural networks, genetic algorithms, and genetic programming with some textbook-type problems given. There are also many industrial and development efforts in the...
493 p actvn 29/11/2023 31 0
Từ khóa: Intelligent control systems, Soft computing methodologies, Data processing, Soft computing, Fuzzy logic, Intelligent search, Translation of the data found
Ebook "Natural language processing with PyTorch: Build intelligent language applications using deep learning" aims to bring newcomers to natural language processing (NLP) and deep learning to a tasting table covering important topics in both areas. Both of these subject areas are growing exponentially. As it introduces both deep learning and NLP with an emphasis on implementation, this book occupies an important middle ground.
210 p actvn 29/11/2023 22 0
Từ khóa: Natural language processing with PyTorch, Build intelligent language applications, Deep learning, The supervised learning paradigm, TF-IDF representation, Computational graphs, Computational linguistics, Neural network models
Ebook Computer security and cryptography: Part 1
Ebook Computer security and cryptography part 1 includes contents: Chapter 1 aperitifs, chapter 2 columnar transposition, chapter 3 monoalphabetic substitution, chapter 4 polyalphabetic substitution, chapter 5 statistical tests, chapter 6 the emergence of cipher machines, chapter 7 the Japanese cipher machines, chapter 8 stream ciphers.
303 p actvn 26/09/2023 69 0
Từ khóa: Computer security and cryptography, Computer security, Columnar transposition, Monoalphabetic substitution, The emergence of cipher machines, Polyalphabetic substitution
Ebook Cyber threat: How to manage the growing risk of cyber attacks
This book is an attempt to raise the level of awareness about the cyber threat and what to do about it. The cyber threat is a board of directors’ issue. Yet when some senior executives and board members hear the word “security” or “technology,” there’s a disconnect. They think it’s not their issue. Let the technology people deal with it. Let the security people deal with it. Although there is evidence that this perception is...
224 p actvn 26/09/2023 53 0
Từ khóa: Cyber threat, Computer security, Cyber attacks, The risk of cyber attacks, Corporations security measures, Business enterprises, Computer networks security measures
Đăng nhập
Bộ sưu tập nổi bật
10 19594
Bộ sưu tập Tài liệu học tiếng Anh
14 82965
Bộ sưu tập Kỹ thuật viễn thông
11 16531
12 23564