Flylib.com
Part 4: Investigating Computer Crime
Previous page
Table of content
Next page
Chapter List
Chapter 19: Investigating Computer Intrusions
Chapter 20: Sex Offenders on the Internet
Chapter 21: Cyberstalking
Chapter 22: Digital Evidence as Alibi
Previous page
Table of content
Next page
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279
Authors:
Eoghan Casey BS MA
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Optimizing: The Crystal Reports Side
Optimizing: The Oracle Side
Optimizing: Reducing Parses
Data Dictionary Report
A Practitioners Guide to Software Test Design
State-Transition Testing
Use Case Testing
Data Flow Testing
Section III - Testing Paradigms
When to Stop Testing
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Exploring the R1C1 Cell Reference Style
Importing Data from Access Databases
Rounding and Truncating Numbers
Building Support for Vectors
Considering Cash Flow Alternatives
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Organizational change
Leading change
Part II - The Applications
Mergers and acquisitions
IT-based process change
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
UPDATE
Execution Plans Generated by the Planner
Indexing Custom Data Types
Client 1Connecting to the Server
Overview
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies