Welcome![Sign In][Sign Up]
Location:
Search - forensic

Search list

[Other resourceX-Ways_forensics_introduction

Description: 由中国计算机取证小组一手炮制的取证工具 X-Ways Forensic的教程,里面包括对常用加密工具加密的文件破解的内容.
Platform: | Size: 3987834 | Author: 华关冰 | Hits:

[OS programForensic

Description: Forensic.zip不用再说了吧,快下吧,下罢
Platform: | Size: 26876 | Author: keyer | Hits:

[Linux-UnixFile+System+Forensic+Analysis

Description: File System Forensic Analysis is a good book to learn linux file system
Platform: | Size: 3994012 | Author: 与乁 | Hits:

[Technology Management2

Description: 自然辩证技术新技术 -Natural dialectical techniques in forensic science technology new technology new technology
Platform: | Size: 281600 | Author: hn | Hits:

[OtherX-Ways_forensics_introduction

Description: 由中国计算机取证小组一手炮制的取证工具 X-Ways Forensic的教程,里面包括对常用加密工具加密的文件破解的内容.-By the China Computer Forensics group single-handedly concocted evidence tool X-Ways Forensic tutorials, which include encryption tools commonly used to crack encrypted files content.
Platform: | Size: 4028416 | Author: 华关冰 | Hits:

[OS programForensic

Description: Forensic.zip不用再说了吧,快下吧,下罢-Needless to say the right Forensic.zip, fast, are you, the next stop
Platform: | Size: 26624 | Author: keyer | Hits:

[Windows DevelopX-Ways-forensics-readme

Description: 计算机取证界的权威软件X-Ways forensics的中文使用帮助,在网上很难找到的,chm格式-Computer forensics software, an authority on X-Ways forensics Chinese use the help of the Internet is very difficult to find, chm format
Platform: | Size: 3987456 | Author: sjun | Hits:

[Linux-UnixFile+System+Forensic+Analysis

Description: File System Forensic Analysis is a good book to learn linux file system
Platform: | Size: 3993600 | Author: 与乁 | Hits:

[JSP/JavaMobile-Agent-Technology-Code

Description: 《移动Agent技术》一书的所有章节源代码。-" Mobile Agent Technology" one book of all sections of the source code.
Platform: | Size: 29083648 | Author: shiguizhi | Hits:

[Windows DevelopOreilly.iPhone.Forensics

Description: 本书是关于iPhone编程的学习,因为是一个概论,所以我选择开发环境为CHM-This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!
Platform: | Size: 4154368 | Author: zhuge | Hits:

[JSPjsp_kj

Description: 讲师:张 冰 原中关村软件园实训基地讲师 原新东方职业教育(新东方IT培训)高级讲师 原德国西门子培训讲师 IBM软件工程师项目讲师 政府653工程信息安全专家组成员 教育部NIT-pr考试命题专家组成员 国家安全局特聘讲师 铁道部特聘讲师 信息产业部国家信息化工程师讲师 长年为总参、总装、二炮、中国软件行业协会、全国各地的软件公司以及各大高校等做企业培训或师资培训 计算机犯罪司法鉴定专家-Instructor: Zhang ice Zhongguancun Software Park training base of vocational education lecturer at the former New Oriental (New Oriental IT training), senior lecturer in the original German Siemens trainers IBM software engineer project engineering lecturer at the Government Information Security Group 653 members of the Ministry of Education, NIT-pr test Proposition members of the Group National Security Agency, Distinguished Lecturer, Distinguished Lecturer, the Ministry of Railways Ministry of National Lecturer for many years as the General Staff of engineers, assembly, Second Artillery, China Software Industry Association, the country' s software companies as well as major colleges and universities to do business training or teacher training in computer crime forensic experts
Platform: | Size: 1145856 | Author: ana | Hits:

[OtherLive_Forensics_Using_WFT

Description: Live Forensics on a Windows System: Using Windows Forensic Toolchest (WFT)
Platform: | Size: 268288 | Author: David | Hits:

[OtherFireWire_Memory_Dump_of_Windows_XP

Description: FireWire Memory Dump of a Windows XP Computer: A Forensic Approach
Platform: | Size: 375808 | Author: David | Hits:

[DocumentsInvestigation_on_Model_Selection_Criteria_for_Spe

Description: Speaker recognition is the task of validating individual s identity using invariant features extracted from their voices print. Speaker recognition technology common applications include authentication, surveillance and forensic applications. This Paper investigates the performance of three automatic model selections based on Gaussian Mixture Model (GMM). These approaches are Bayesian information criterion (BIC), Bayesian Ying–Yang harmony empirical learning criterion (BYY-HEC) and Bayesian Ying–Yang harmony data smoothing learning criterion (BYY-HDS). Experimental evaluation of these methods is presented.
Platform: | Size: 243712 | Author: ZCEEE | Hits:

[Special EffectsForensiDetectionofImageManipulationUsing

Description: Image Pixel Value mapping for Forensic images
Platform: | Size: 65536 | Author: Amburose | Hits:

[Software EngineeringForensic-Analysis-of-a-SQL-2005

Description: Forensic Analysis of a SQL Server 2005 Database Server 语言:英文 格式:pdf-Forensic Analysis of a SQL Server 2005 Database Server Format:pdf
Platform: | Size: 934912 | Author: TekTek | Hits:

[Otherforensic-and-anti-forensic--

Description: 取证与反取证 计算机取证就是运用软件技术和工具,照预定的步骤检查计算机系统和相关外部设备,保护、提取和分析计算机犯罪的痕迹,并产生具有法律效力的电子证据的过程。 反取证就是删除或者隐藏证据使取证调查无效。 -Forensics and anti-forensics Computer Forensics is the use of software technology and tools, according to the predetermined steps to check the computer system and related peripheral equipment, protection, retrieval and analysis of traces of computer crime, and produce legally binding electronic evidence process. Anti-forensics is to remove or hide the evidence of the forensic investigation is invalid.
Platform: | Size: 3795968 | Author: wang | Hits:

[OtherForensic-analysis-of-mobile-phone-internal-memory

Description: Forensic analysis of mobile phone internal memory
Platform: | Size: 313344 | Author: vsb0004 | Hits:

[OtherDigital-Forensic

Description: explain about digital forensic using wireshark
Platform: | Size: 5363712 | Author: hantukiss | Hits:

[OtherDICOM WATERMARKING

Description: Biometric based Information Forensic
Platform: | Size: 3458048 | Author: ganu | Hits:
« 12 3 4 »

CodeBus www.codebus.net