1.

Record Nr.

UNINA990003091320403321

Autore

Mwabu, Germano

Titolo

Health Development in Africa / by Germano Mwabu

Collana

Economic Research Papers / African Development Bank ; 98.38

Disciplina

M/4.24

Locazione

SES

Collocazione

Paper

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNIORUON00210323

Autore

BOHMEROVA, Ada

Titolo

Slovak for you : Slovak for Speakers of English : Textbook for Beginners = Slovencina pre vás : slovencina pre anglicky hovoriacich : ucebnica pre zaciatocníkov / by Ada Böhmerová

Pubbl/distr/stampa

Bratislava, : Perfekt, 1996

ISBN

80-8046-017-5

Descrizione fisica

141 p. : ill. ; 30 cm.

Disciplina

491.87

Soggetti

LINGUA SLOVACCA - GRAMMATICA

Lingua di pubblicazione

Slovacco

Formato

Materiale a stampa

Livello bibliografico

Monografia



3.

Record Nr.

UNINA9910826648003321

Autore

Ferrence Matthew J.

Titolo

All-American redneck : variations on an icon, from James Fenimore Cooper to the Dixie Chicks / / Matthew J. Ferrence

Pubbl/distr/stampa

Knoxville, Tennessee : , : The University of Tennessee Press, , 2014

©2014

ISBN

1-62190-074-6

Edizione

[First edition.]

Descrizione fisica

1 online resource (pages cm)

Disciplina

810.9/355

Soggetti

Rednecks in literature

American literature - History and criticism

Rednecks in popular culture

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.



4.

Record Nr.

UNINA9910964667403321

Titolo

Computer Forensics jumpstart / / Michael G. Solomon ... [et al.]

Pubbl/distr/stampa

Indianopolis, IN, : Wiley, c2011

ISBN

9786613374523

9781283374521

1283374528

9781118067574

1118067576

Edizione

[2nd ed.]

Descrizione fisica

1 online resource (338 p.)

Collana

Sybex Serious Skills

Altri autori (Persone)

SolomonMichael R

Disciplina

005.8

363.25968

Soggetti

Computer security

Computer networks - Security measures

Computer crimes - Investments

Forensic sciences

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Computer Forensics JumpStart, Second Edition; Acknowledgments; About the Authors; Contents; Introduction; Who Should Read This Book; What This Book Covers; Making the Most of This Book; How to Contact the Authors; Chapter 1: The Need for Computer Forensics; Defining Computer Forensics; Computer Crime in Real Life; Corporate versus Law Enforcement Concerns; Training; What Are Your Organizations's Needs?; Terms to Know; Review Questions; Chapter 2: Preparation-What to Do Before You Start; Know Your Hardware; Know Your Operating System; Know Your Limits; Develop Your Incident Response Team

Terms to KnowReview Questions; Chapter 3: Computer Evidence; What Is Computer Evidense?; Search and Seizure; Chain of Custody; Admissibility of Evidence in a Court of Law; Leave No Trace; Terms to Know; Review Questions; Chapter 4: Common Tasks; Evidence Identification; Evidence Preservation; Evidence Analysis; Evidence Presentation; Terms to Know; Review Questions; Chapter 5: Capturing



the Data Image; The Imaging Process; Partial Volume Images; Working with Virtual Machines; Imaging/Capture Tools; Terms to Know; Review Questions; Chapter 6: Extracting Information from Data

What Are You Looking For?How People Think; Picking the Low-Hanging Fruit; Hidden Evidence; Trace Evidence; Terms to Know; Review Questions; Chapter 7: Passwords and Encryption; Passwords; Encryption Basics; Common Encryption Packages; Strengths and Weaknesses of Encryption; Handling Encrypted Data; Terms to Know; Review Questions; Chapter 8: Common Forensic Tools; Disk Imaging and Validation Tools; Forensic Tools; Your Forensic Toolkit; Terms to Know; Review Questions; Chapter 9: Pulling It All Together; Creating East-to-Use Reports; Document Everything, Assume Nothing; Formulating the Report

Sample Analysis ReportsUsing Software to Generate Reports; Terms to Know; Review Questions; Chapter 10: How to Testify in Court; Preparation Is Everything; Appearance Matters; What Matters Is What They Hear; Know Your Forensic Process and Tools; Say Only What You Must; Keep It Simple; Be Ready to Justify Every Step; Summary; Terms to Know; Review Questions; Appendix A: Answers to Review Questions; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Appendix B: Forensic Resources; Information; Organizations; Publications; Services

SoftwareHardware; Traininig; Appendix C: Forensic Certifications and More; AccessData Certified Examiner (ACE); Advanced Information Security (AIS); Certified Computer Examiner (CCE); Certified Hacking Forensic Investigator (CHFI); Certified Forensic Computer Examiner (CFCE); Certified Information Systems Auditor (CISA); Certified ProDiscover Examiner (CPE); EnCase Certified Examiner Program; GIAC Certified Forensic Analyst (GCFA); GIAC Certified Forensics Examiner (GCFE); Professional Certified Investigator (PCI); ASCLD/LAB Accreditation; Licensure; Appendix D: Forensic Tools

Foresnsic Tools Suites

Sommario/riassunto

Essential reading for launching a career in computer forensics Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the r