Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 12 of 12 matches in All Departments
The Photographic Atlas of the Stars contains 50, high-quality full color photographs of the entire night sky of the northern and southern hemispheres. Each plate is accompanied by a star map of the identical area, which identifies the main stars of the constituent constellations as well as other interesting astronomical objects. In addition to this detail, Sir Patrick Moore has written a commentary for each plate that highlights the stars and objects of interest to observers equipped with binoculars and that includes detailed tabular information on astronomical objects of the region. The resulting double-page spread provides an invaluable reference for the amateur astronomer, detailing the constellations and other heavenly bodies of interest that are observable with the naked eye, binoculars, or a small telescope.
Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.
Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.
Sacred poems of Jason P Doherty. Spiritual exploration and expressions of love and devotion. These words are dedicated to my beloved Weezee.
The book is a fictional story about three generations of people and their online and offline computer related activities. Sometimes the activity is lawful and at other times it is not. The dialogue from each person teaches us about digital forensics, Cybercrime, or just the dangers that exist online.
The book is a fictional story about three generations of people and their online and offline computer related activities. Sometimes the activity is lawful and at other times it is not. The dialogue from each person teaches us about digital forensics, Cybercrime, or just the dangers that exist online.
This book discusses a variety of topics such as cell phone seizure and examination, electrical fire investigation, potential vulnerabilities when using historic electrical devices, interpersonal conduct in the Middle East, Russia, and the USA, intellectual property theft, spy cases, and various motivations for crime in a manner that everyone can understand. We also discuss various test equipment and software used for collecting evidence from both physical evidence and invisible radio frequency artifacts. We also discuss electronic equipment that is used to destroy various documents as well as both human and automated processes used to reconstruct small shreds of paper. We discuss real cases regarding document reconstruction such as the American Embassy in Iran and the recently discovered East German (secret police) Stasi shredded records. We also discuss the Hanssen spying case using a PDA and low tech techniques such as the dead drop. Lastly, Jeff Marsh, a brilliant man who became disabled due to an unfortunate accident, demonstrates with the help of Dr. Doherty, various devices such as clocks and mustard jars with concealed purposes that may be used by undercover surveillance professionals or private investigators in a variety of settings, once proper approval is given. Jeff also discusses recreation and conversation as a means of exercising our intellect and informally learning from other people.
This book discusses the process of investigating and analyzing electronic equipment, detecting devices, wireless signals, and the prosecution and prevention of high tech crime. The coauthors are from private industry and academia and really provide a wide variety of perspectives on the detection of electronic eavesdropping devices, wiretaps, various electronic signals, and the collection and examination of information from laptops, desktop computers, and PDAs. Kenneth Bruno does an excellent job teaching the reader about all the equipment used in electronic eavesdropping detection. We also introduce the reader to various pieces of electronic equipment used to detect and identify explosives, biochemical weapons, as well as historic unexploded ordinance. The reader is also introduced to the legal system by Mr. Joel Liebesfeld who does corporate investigations and is often employed by clients who are in the legal profession or insurance industry. Mr. Joel Liebesfeld and Dr. Doherty discuss the process of becoming an expert witness who may testify to what was found using scientific methods in combination with electronic signal detection or computer forensic equipment. We hope that the readership of the book will include high school students considering a career in private industry, law enforcement, intelligence agencies, or the military. A background in electronics, math, and computer science is helpful but not necessary in reading this book. Lockard's Principle of Exchange specifies that two objects or people that come in contact with each other will change. We hope that this book changes you by increasing your understanding of electronic devices, investigation, and the justice system.
|
You may like...
Chitin- and Chitosan-Based Biocomposites…
Jissy Jacob, Sravanthi Loganathan, …
Paperback
R677
Discovery Miles 6 770
Food Packaging - Advanced Materials…
Sanjay Mavinkere Rangappa, Jyotishkumar Parameswaranpillai, …
Hardcover
R4,083
Discovery Miles 40 830
Synthesis of Polymers - New Structures…
DA Schluter
Hardcover
Biodegradable Polymers - Concepts and…
Margarita del Rosario Salazar, Jose Fernando Solanilla Duque, …
Hardcover
R4,598
Discovery Miles 45 980
Expanding Monomers - Synthesis…
Rajender Kumar Sadhir, Russell M. Luck
Hardcover
Electrical Properties of Polymers
Evaristo Riande, Ricardo Diaz-Calleja
Paperback
R1,531
Discovery Miles 15 310
|