Book picks similar to
Computer Forensics: Principles and Practices by Linda Volonino


computers
computer-forensics
dean
digital-forensics-general

Comptia Security+: Get Certified Get Ahead: Sy0-301 Study Guide


Darril Gibson - 2011
    The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he's honed in the classroom that have helped hundreds of students master the Security+ content. You'll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what's important. Over 450 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You'll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you'll be a step ahead for other exams. This SY0-301 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author supplements the book with blog posts here: http: //blogs.getcertifiedgetahead.com/. This page provides a full listing of mobile device apps from the author: http: //learnzapp.com/partners/darrilgibson/

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.

Configuring Windows 7: Self-Paced Training Kit (MCTS Exam 70-680)


Ian L. McLean - 2009
    This Self-Paced Training Kit is designed to help maximize your performance on 70-680, the required exam for the Microsoft Certified Technology Specialist (MCTS): Windows 7, Configuration certification.This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features exam candidates want most—including in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and customizable testing options. It also provides real-world scenarios, case study examples, and troubleshooting labs to give you the skills and expertise you can use on the job.Work at your own pace through the lessons and lab exercises. This official study guide covers installing, upgrading, and migrating to Windows 7; configuring network connectivity, applications, and devices; implementing backup and recovery; configuring User Account Control (UAC), mobility options, and new features such as DirectAccess and BranchCache; and managing system updates.Then assess yourself using the 200 practice questions on CD, featuring multiple customizable testing options to meet your specific needs. Choose timed or untimed testing mode, generate random tests, or focus on discrete objectives. You get detailed explanations for right and wrong answers—including pointers back to the book for further study. You also get an exam discount voucher—making this kit an exceptional value and a great career investment.

Adobe Photoshop Lightroom 4 Book: The Complete Guide for Photographers


Martin Evening - 2012
    This completely updated bestseller was also written with photographers in mind. Author Martin Evening describes features in Lightroom 4 in detail from a photographer’s perspective. As an established commercial and fashion photographer, Martin knows firsthand what photographers need for an efficient workflow. He has also been working with Lightroom from the beginning, monitoring the product’s development and providing valued feedback to Adobe. As a result, Martin knows the software inside and out, from image selection to image editing to image management. In this book you’ll learn how to:• Work efficiently with images shot in the raw or JPEG format • Import photographs with ease and sort them according to your workflow• Create and manage a personal image library• Apply tonal adjustments to multiple images quickly• Integrate Lightroom with Adobe Photoshop• Export images for print or Web as digital contact sheets or personal portfolios• Make the most of new features in Lightroom 4, such as the Camera Raw Process 2012 Basic panel tone controlsPhotographers will find Lightroom 4–and The Adobe Photoshop Lightroom 4 Book–indispensable tools in their digital darkrooms.This book’s companion site, www.thelightroombook.com, offers video tutorials, articles, sample images, and updates from author Martin Evening.“With Martin’s expert guidance, you’ll soon find that you have precisely the tools you need to turn your concentration back where it belongs–on making better pictures!”–George Jardine, digital photography consultant “As a photographer himself, Martin Evening knows what tools photographers need to realize their creative vision. In this book, he shows not only how Adobe Photoshop Lightroom works but also why it will become an essential part of any photographer’s workflow.”–Greg Gorman, photographer

Object-Oriented Information Systems Analysis and Design Using UML


Simon Bennett - 1999
    It can be used as a course book for students who are first encountering systems analysis and design at any level. This second edition contains many updates, including the latest version of the UML standard, and reflects the most up to date approaches to the information systems development process. It provides a clear and comprehensive treatment of UML 1.4 in the context of the systems development life cycle, without assuming previous knowledge of analysis and design. It also discusses implementation issues in detail and gives code fragments to show possible mappings to implementation technology. Extensive use of examples and exercises from two case studies provides the reader with many opportunities to practise the application of UML.

Stealing the Network: How to Own a Shadow


Johnny Long - 2007
    Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

Darknet: A Beginner's Guide to Staying Anonymous


Lance Henderson - 2012
    This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!

Android Hacker's Handbook


Joshua J. Drake - 2013
    Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Business Data Communications and Networking


Jerry FitzGerald - 1995
    Updated with the latest advances in the field, Jerry FitzGerald and Alan Dennis' 10th Edition of Business Data Communications and Networking continues to provide the fundamental concepts and cutting-edge coverage applications that students need to succeed in this fast-moving field.Authors FitzGerald and Dennis have developed a foundation and balanced presentation from which new technologies and applications can be easily understood, evaluated, and compared.

Training Guide: Programming in HTML5 with JavaScript and CSS3


Glenn Johnson - 2013
    Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.Provides in-depth, hands-on training you take at your own pace Focuses on job-role-specific expertise for using HTML5, JavaScript, and CSS3 to begin building modern web and Windows 8 apps Features pragmatic lessons, exercises, and practices Creates a foundation of skills which, along with on-the-job experience, can be measured by Microsoft Certification exams such as 70-480 Coverage includes: creating HTML5 documents; implementing styles with CSS3; JavaScript in depth; using Microsoft developer tools; AJAX; multimedia support; drawing with Canvas and SVG; drag and drop functionality; location-aware apps; web storage; offline apps; writing your first simple Windows 8 apps; and other key topics

Mastering Excel Macros: Introduction (Book 1)


Mark Moore - 2014
    Everybody wants to learn them. You're not a programmer though. How is a non technical user going to learn how to program? You do want to use macros to make your work easier but are you really going to sit down with a huge programming textbook and work your way through every. single. boring. page? Like most people, you'll start with great enthusiasm and vigor but after a few chapters, the novelty wears off. It gets boring. I'm going to try and change that and make learning macro programming entertaining and accessible to non-techies. First of all, programming Excel macros is a huge topic. Let's eat the elephant one bite at a time. Instead of sitting down with a dry, heavy text, you will read very focused, to the point topics. You can then immediately use what you learned in the real world. This is the first lesson in the series. You will learn what macros are, how to access them, a tiny bit of programming theory (just so you have a clue as to what's going on) and how to record macros. As with all my other lessons, this one has a follow along workbook that you can use to work through the exercises. The images in the lessons are based on Excel 2013 for Windows.

Laravel: Up and Running: A Framework for Building Modern PHP Apps


Matt Stauffer - 2016
    This rapid application development framework and its vast ecosystem of tools let you quickly build new sites and applications with clean, readable code. With this practical guide, Matt Stauffer--a leading teacher and developer in the Laravel community--provides the definitive introduction to one of today's most popular web frameworks.The book's high-level overview and concrete examples will help experienced PHP web developers get started with Laravel right away. By the time you reach the last page, you should feel comfortable writing an entire application in Laravel from scratch.Dive into several features of this framework, including:Blade, Laravel's powerful, custom templating toolTools for gathering, validating, normalizing, and filtering user-provided dataLaravel's Eloquent ORM for working with the application's databasesThe Illuminate request object, and its role in the application lifecyclePHPUnit, Mockery, and PHPSpec for testing your PHP codeLaravel's tools for writing JSON and RESTful APIsInterfaces for file system access, sessions, cookies, caches, and searchTools for implementing queues, jobs, events, and WebSocket event publishingLaravel's specialty packages: Scout, Passport, Cashier, Echo, Elixir, Valet, and Socialite

Gray Man: Camouflage for Crowds, Cities, and Civil Crisis


Matthew Dermody - 2017
    He hides in the corners of conformity. He only flaunts a quotidian nature. He meanders through the mundane and occupies the ordinary. Individual expression and exceptionalism are his enemies. The Gray Man is the forgettable face, the ghost guy, the hidden human. Implementing the concepts is more than looking less tactical, less hostile, or less threatening. It is the willful abandonment of anything and everything that defines oneself as different. Using his unique "S" word conceptual approach featured in Appear to Vanish, camouflage and concealment expert Matthew Dermody discusses the concepts, tactics and mindset necessary to assimilate into any urban environment. From the safety-conscious international traveler to the SERE contingencies of the deep cover foreign operative, GRAY MAN is the definitive urban concealment resource.

Working with UNIX Processes


Jesse Storimer - 2011
    Want to impress your coworkers and write the fastest, most efficient, stable code you ever have? Don't reinvent the wheel. Reuse decades of research into battle-tested, highly optimized, and proven techniques available on any Unix system.This book will teach you what you need to know so that you can write your own servers, debug your entire stack when things go awry, and understand how things are working under the hood.http://www.jstorimer.com/products/wor...