Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 0. – 0 с. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с. John S. Dempsey, Linda S. Forst. An Introduction to Policing. – М.: , 2009. – 0 с. Patrick A. Gaughan. Measuring Business Interruption Losses and Other Commercial Damages. – М.: John Wiley and Sons, Ltd, 2009. – 528 с. Wing Kam Fung, Yue-Qing Hu. Statistical DNA Forensics: Theory, Methods and Computation. – М.: Wiley, 2008. – 262 с. Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing. – М.: , 2010. – 368 с. Editor Dave Kleiman. The Official CHFI: Exam 312-49: Study Guide. – М.: Syngress, 2010. – 964 с. Micah Solomon. Computer Forensics JumpStartTM. – М.: , 2004. – 304 с. Linda Volonino. Computer Forensics For Dummies®. – М.: , 2008. – 384 с. Michael Sheetz. Computer Forensics. – М.: , 2007. – 176 с. Michael G. Solomon. Computer Forensics JumpStart. – М.: , 2011. – 336 с. Erik Laykin. Investigative Computer Forensics. – М.: , 2011. – 320 с. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с. Hacker'S Challenge 3. – М.: , 2011. – 400 с. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с. European Commission European Commission and Directorate-General for Research and Innovation Director. Sealing of Underground Respositories for Radioactive Waste in Salt. – М.: Dictus Publishing, 2011. – 312 с. Viplav Gautam and Saurabh Sharma. Study of Speaker Recognition. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Swagota Bera and Monisha Sharma. Statistical and Visual Detection of Real Time Stego Images. – М.: LAP Lambert Academic Publishing, 2015. – 104 с. Kirti Rani. Computers & Biotechnology. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Anjan Kumar Payra. Steganology for the Computer Forensics Examiners. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Agufa Semenye. Criminal Profiling: A tool in investigating computer crimes. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Palaniappan Shamala and Abd Manaf Azizah. Digital Computer Forensic: Validation and Verification for Disk Imaging. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Raza Hasan. Forensic Computing. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. April L. Tanner and David A. Dampier. Digital Forensic Investigations Visualized. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Andrew Marrington. Computer Forensic Profiling. – М.: LAP Lambert Academic Publishing, 2010. – 188 с. Yigithan Dedeoglu. Algorithms for Smart Video Surveillance. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Emilio Serrano,Juan A. Botia and Jose M. Cadenas. Advancing the state of the art in the analysis of multi-agent systems. – М.: LAP Lambert Academic Publishing, 2011. – 208 с. Paresh Kerai. Remote Access Forensics for VNC and RDP on Windows Platform. – М.: LAP Lambert Academic Publishing, 2012. – 168 с. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с. Дополнительные результаты Laszlo Gyorfi. Machine Learning for Financial Engineering (Advances in Computer Science and Engineering: Texts). – М.: , 2012. – 250 с. Max Houck. Smart Guide To Forensic Careers. – М.: , 2012. – 272 с. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Social Computing, Behavioral-Cultural Modeling and Prediction: 5th International Conference, SBP 2012, College Park, MD, USA, April 3-5, 2012, ... Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 380 с. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с. Karen Mcneil. How to Land a Top-Paying Forensic accountants Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More. – М.: , 2012. – 86 с. Sara Gibson. How to Land a Top-Paying Computer help desk representatives Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, ... What to Expect From Recruiters and More. – М.: , 2012. – 90 с. Domingo Tavella. Quantitative Methods in Derivatives Pricing: An Introduction to Computational Finance. – М.: , 0. – 0 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 0. – 0 с. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с. James W. Cortada. Before the Computer. – М.: , 0. – 0 с. James W. Cortada. The Digital Hand: How Computers Changed the Work of American Manufacturing, Transportation, and Retail Industries. – М.: , 0. – 0 с. Frank Levy, Richard J. Murnane. The New Division of Labor: How Computers Are Creating the Next Job Market. – М.: , 0. – 0 с. Michael Prietula, Kathleen, Les Gasser, Kathleen Carley, Leslie George Gasser. Simulating Organizations: Computational Models of Institutions and Groups. – М.: , 0. – 0 с. Zhiang Lin, Kathleen M. Carley. Designing Stress Resistant Organizations: Computational Theorizing and Crisis Applications (Information and Organization Design Series). – М.: , 0. – 0 с. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, 27). – М.: , 0. – 0 с. Abdullah Abdul-Gader, Abdullah H. Al-Abdul-Gader. Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. – М.: , 0. – 0 с. Roger A. McCain. Agent-Based Computer Simulation of Dichotomous Economic Growth (ADVANCES IN COMPUTATIONAL ECONOMICS Volume 13). – М.: , 0. – 0 с. Mario J. Miranda, Paul L. Fackler. Applied Computational Economics and Finance. – М.: , 0. – 0 с. Hans M. Amman, David A. Kendrick, John Rust. Handbook of Computational Economics. – М.: North Holland, 1996. – 832 с. Kumaraswamy Velupillai. Computable Economics: The Arne Ryde Memorial Lectures (Arne Ryde Memorial Lectures). – М.: , 0. – 0 с. G. M. P. Swann, Martha Prevezer, David Stout, G. M. Peter Swann, David K. Stout. The Dynamics of Industrial Clustering: International Comparisons in Computing and Biotechnology. – М.: , 0. – 0 с. Steffen Jrgensen, Georges Zaccour. Optimal Control and Differential Games: Essays in Honor of Steffen Jorgensen (Advances in Computational Management Science). – М.: , 0. – 0 с. Soren S. Nielsen. Programming Languages and Systems in Computational Economics and Finance (Advances in Computational Economics, 18). – М.: , 0. – 0 с. Abdul Bangura. Computer Programming to Insure Project Accountability in Africa. – М.: , 0. – 0 с. Abdol S. Soofi, Liangyue Cao. Modelling and Forecasting Financial Data: Techniques of Nonlinear Dynamics (Studies in Computational Finance, Volume 2). – М.: , 0. – 0 с. Thomas Brenner. Computational Techniques for Modelling Learning in Economics (Advances in Computational Economics, V. 11). – М.: , 0. – 0 с. Francesco Luna, Benedikt Stefansson. Economic Simulations in Swarm: Agent-Based Modelling and Object (ADVANCES IN COMPUTATIONAL ECONOMICS Volume 14). – М.: , 0. – 0 с. Virginia?Ferrell Andersen. Digital Recall: Computers Aren't the Only Ones With Memory. – М.: , 0. – 0 с. Suparna Damany, Jack Bellis. It's Not Carpal Tunnel Syndrome! RSI Theory & Therapy for Computer Professionals. – М.: , 0. – 0 с. Paul Linden. Comfort at Your Computer: Body Awarness Training for Pain-Free Computer Use. – М.: , 0. – 0 с. Peter D. Barnett. Ethics in Forensic Science: Professional Standards for the Practice of Criminalistics. – М.: , 0. – 0 с. Deborah G. Johnson, Helen Nissenbaum. Computers, Ethics and Social Values. – М.: , 0. – 0 с. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с. Tom Forester, Perry Morrison. Computer Ethics, Second Edition: Cautionary Tales and Ethical Dilemmas in Computing. – М.: , 0. – 0 с. Alessandro Lomi, Erik R. Larsen. Dynamics of Organizations: Computational Modeling and Organizational Theories. – М.: AAAI Press, 2001. – 352 с. Computer-Supported Cooperative Work : A Book of Readings. – М.: , 0. – 0 с. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с. Janet Ruhl. Computer Job Survival Guide. – М.: , 0. – 0 с. Don Knowles. Today's Technician: Automotive Computer Systems. – М.: , 0. – 0 с. Joan Vaughn. COMPUTER TECH CAREER STARTER 2E. – М.: , 0. – 0 с. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с. Peter Meyer. Getting Started in Computer Consulting. – М.: , 0. – 0 с. Considering Computer Contracting? : How to become a successful freelance computer professional ("Computer Weekly" Professional S.). – М.: , 0. – 0 с. Erricos John Kontoghiorghes, Berc Rustem, Stavros Siokos. Computational Methods in Decision-Making, Economics and Finance (Applied Optimization, 74). – М.: , 0. – 0 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. Blythe Camenson. Opportunities in Forensic Science Careers. – М.: , 0. – 0 с. Janet Ruhl. Janet Ruhl's Answers for Computer Contractors: How to Get the Highest Rates and the Fairest Deals from Consulting Firms, Agencies, and Clients. – М.: , 0. – 0 с. Carol L. Covin. The Best Computer Jobs in America: 20 Minutes from Home. – М.: , 0. – 0 с. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. Richard H. Berube. Computer Simulated Experiments for Digital Electronics Using Electronics Workbench. – М.: , 0. – 0 с. W. Prasad Kodali. Engineering Electromagnetic Compatibility : Principles, Measurements, Technologies, and Computer Models. – М.: , 0. – 0 с. Natalie F. Harris, Nils Conrad Persson. ES&T Mag.Presents Computer Troubleshooting & Repair. – М.: , 0. – 0 с. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с. Dan L. Beeson. Assembling and Repairing Personal Computers (2nd Edition). – М.: , 0. – 0 с. Richard H. Berube. Computer Simulated Experiments for Electronic Devices Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с. Richard H. Berube, Richard Berube. Computer Simulated Experiments for Electric Circuits Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с. The Linear Complementarity Problem (Computer Science and Scientific Computing). – М.: , 0. – 0 с. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, ?27). – М.: , 0. – 0 с. Hans M. Amman, Berc Rustem, Andrew Whinston, Hans Amman. Computational Approaches to Economic Problems (Advances in Computational Economics, Vol. 6). – М.: , 0. – 0 с. Alan H. Kvanli. Introduction to Business Statistics: A Computer Integrated, Data Analysis Approach. – М.: , 0. – 0 с. Shu-Heng Chen. Evolutionary Computation in Economics and Finance. – М.: , 0. – 0 с. Cornelis A. Los, Cornelis A Los. Computational Finance. – М.: , 0. – 0 с. Boris Kovalerchuk, Evgenii Vityaev. Data Mining in Finance: Advances in Relational and Hybrid Methods (Kluwer International Series in Engineering and Computer Science, 547). – М.: , 0. – 0 с. IT Investment: Making a Business Case (Computer Weekly Professional Series). – М.: , 0. – 0 с. Richard Clodfelter. Making Buying Decisions: Using the Computer As a Tool. – М.: , 0. – 0 с. Zhengxin Chen. Computational Intelligence for Decision Support. – М.: , 0. – 0 с. David L. Woodruff. Advances in Computational and Stochastic Optimization, Logic Programming, and Heuristic Search: Interfaces in Computer Science and Operations Research (Operations Research/Computer Science Interfaces Series, Orcs 09). – М.: , 0. – 0 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Masoud Mohammadian, Ruhul Amin Sarker, Xin Yao, Ruhul Amin. Computational Intelligence in Control. – М.: , 0. – 0 с. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с. Computer-Managed Maintenance Systems. – М.: , 0. – 0 с. David Taylor's Inside Track: Provocative Insights into the World of IT in Business (Computer Weekly Professional Series,). – М.: , 0. – 0 с. Time to take control : The impact of change on corporate computer systems. – М.: , 0. – 0 с. Neal G. Shaw. Strategies for Managing Computer Software Upgrades. – М.: , 0. – 0 с. G. David Garson. Computer Technology and Social Issues. – М.: , 0. – 0 с. Computer Hardware Maintenance : An IS/IT Manager's Guide (Datamation Professional Series). – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с. Colin D. Lewis. Demand Forecasting and Inventory Control : A Computer Aided Learning Approach (Oliver Wight Manufacturing). – М.: , 0. – 0 с. Nancy Stern, Robert A. Stern. Computing in the Information Age, 2nd Edition. – М.: , 0. – 0 с. Ray Wyatt. Computer-aided Policymaking: Lessons from Strategic Planning Software. – М.: , 0. – 0 с. Elaine Weiss. The Accidental Trainer : You Know Computers, So They Want You to Teach Everyone Else (Jossey-Bass Business & Management Series). – М.: , 0. – 0 с. Joel G. Siegel, Jae Shim, Joel Siegel, Jae K. Shim. The Manager's Handbook of Client/Server Computing in Business and Finance. – М.: , 0. – 0 с. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с. Daniel, Md Farb, Bruce Gordon, Daniel Farb. Internet Searches Manual and CD: Computer Skills Development Program on the Use of the Internet for Optimal Searching, With an Emphasis on Healthcare, Pharmaceuticals, and Sales. – М.: , 0. – 0 с. Alan Gershenfeld, Mark Loparco, Cecilia Barajas. Game Plan: The Insider's Guide to Breaking In and Succeeding in the Computer and Video Game Business. – М.: , 0. – 0 с. Timothy J. Newby, James Lehman, James Russell, Donald A. Stepich. Instructional Technology for Teaching and Learning: Designing Instruction, Integrating Computers, and Using Media. – М.: , 0. – 0 с. Peterson&s. Graduate Programs in Engineering and Computer Science 2004 (Peterson's Decision Guides : Graduate Programs). – М.: , 0. – 0 с. K. K. Shukla. Neuro-Computers: Optimization Based Learning. – М.: , 0. – 0 с. Carolee Freer. Computer Shorthand: Speed Building and Real-Time Transcription (3rd Edition). – М.: , 0. – 0 с. Jean Gonzalez, Alan Roberts, John P. Walsh. Computer Shorthand: Real-Time Theory (3rd Edition). – М.: , 0. – 0 с. John Ross, John A. Ross. Computer Networks for Small Business. – М.: , 0. – 0 с. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Wing Kam Fung, Yue-Qing Hu. Statistical DNA Forensics: Theory, Methods and Computation. – М.: Wiley, 2008. – 262 с. Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing. – М.: , 2010. – 368 с. Micah Solomon. Computer Forensics JumpStartTM. – М.: , 2004. – 304 с. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с. Linda Volonino. Computer Forensics For Dummies®. – М.: , 2008. – 384 с. Michael Sheetz. Computer Forensics. – М.: , 2007. – 176 с. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с. Michael G. Solomon. Computer Forensics JumpStart. – М.: , 2011. – 336 с. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с. Erik Laykin. Investigative Computer Forensics. – М.: , 2011. – 320 с. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с. Hacker'S Challenge 3. – М.: , 2011. – 400 с. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . – с. Committee on DNA Technology in Forensic Science, National Research Council. DNA Technology in Forensic Science. – М.: National Academies Press, 1992. – 200 с. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с. Swagota Bera and Monisha Sharma. Statistical and Visual Detection of Real Time Stego Images. – М.: LAP Lambert Academic Publishing, 2015. – 104 с. Kirti Rani. Computers & Biotechnology. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Anjan Kumar Payra. Steganology for the Computer Forensics Examiners. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Agufa Semenye. Criminal Profiling: A tool in investigating computer crimes. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Palaniappan Shamala and Abd Manaf Azizah. Digital Computer Forensic: Validation and Verification for Disk Imaging. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Raza Hasan. Forensic Computing. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. April L. Tanner and David A. Dampier. Digital Forensic Investigations Visualized. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Andrew Marrington. Computer Forensic Profiling. – М.: LAP Lambert Academic Publishing, 2010. – 188 с. Paresh Kerai. Remote Access Forensics for VNC and RDP on Windows Platform. – М.: LAP Lambert Academic Publishing, 2012. – 168 с. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Мария Оплатила, получила материал.Спасибо. Буду ждать результатов проверки