C Sharp Programming From Problem Analysis to Program Design-3rd Ed

C Sharp Programming From Problem Analysis to Program Design-3rd Ed
English | Size: 55.60 MB
Category: e-books

PREFACE xix
1.Introduction to Computing and Programming 1
2.Data Types and Expressions 65
3.Methods and Behaviors 123
4.Creating Your Own Classes 181
5.Making Decisions 233
6.Repeating Instructions 293
7.Arrays 357
8.Advanced Collections 411
9.Introduction to Windows Programming 461
10. Programming Based on Events 539
11. Advanced Object-Oriented Programming Features 643 [Read more…]

SANS Ondemand packet analysis [webrip 5(mp4)]

SANS Ondemand packet analysis [webrip 5(mp4)]
English | Size: 457.78 MB
Category: Tutorial

Old SANS content for packet analysis but still relevant as TCP is still in use [Read more…]

SANS 518 Mac Forensic Analysis PDFs & MP3 (2015)

SANS 518: Mac Forensic Analysis PDFs & MP3 (2015)
English | Size: 2.25 GB
Category: Tutorial

Mac and iOS Fundamentals: How to analyze and parse the Hierarchical File System (HFS+) by hand and recognize the specific domains of the logical file system and Mac-specific file types.
User Activity: How to understand and profile users through their data files and preference configurations.

Advanced Analysis and Correlation: How to determine how a system has been used or compromised by using the system and user data files in correlation with system log files.
Apple Technologies: How to understand and analyze many Mac and iOS specific technologies, including Time Machine, Spotlight, iCloud, Document Versions, FileVault, Continuity, and FaceTime. [Read more…]

SANS 500: Windows Forensic Analysis (2017)

SANS 500: Windows Forensic Analysis (2017)
English | Size: 244.54 MB
Category: CBTs

FOR500: Windows Forensic Analysis focuses on building in-depth digital forensics knowledge of Microsoft Windows operating systems. You can’t protect what you don’t know about, and understanding forensic capabilities and artifacts is a core component of information security. You will learn how to recover, analyze, and authenticate forensic data on Windows systems, track particular user activity on your network, and organize findings for use in incident response, internal investigations, and civil/criminal litigation. You will be able to use your new skills to validate security tools, enhance vulnerability assessments, identify insider threats, track hackers, and improve security policies. [Read more…]

O’Reilly – Operating System Forensic Analysis

O’Reilly – Operating System Forensic Analysis
English | Size: 783.36 MB
Category: Tutorial

Files, email messages, and social media posts all contain valuable information for digital forensic investigators when searching for evidence of a crime or intrusions into a computer system or network, but there’s also a wealth of information to be gleaned from a computer’s operating system. This includes user data, configuration settings, and a significant trail of user activities. Today, there are a number of tools available to extract and analyze this information. [Read more…]

O’Reilly – Forensic Analysis of Computer Memory

O’Reilly – Forensic Analysis of Computer Memory
English | Size: 658.65 MB
Category: Comp: Security/Encryption

Our connected world today generates unimaginable volumes of data, and sometimes that information can be the key to helping law enforcement and corporate investigators solve crimes or reveal intrusions by hackers into a network. Memory analysis is important for incident responders and cases for which there is essential evidence that could be lost when a system is powered off. Fortunately, there are a number of tools that we can use to help with memory analysis. [Read more…]

O’Reilly – Forensic Analysis of Disk-based Evidence

O’Reilly – Forensic Analysis of Disk-based Evidence
English | Size: 1.02 GB
Category: CBTs

Today, our information- and knowledge-based economy generates vast amounts of data that is at some point saved to storage devices, such as hard drives or solid-state drives or chips, or portable devices like USB sticks. Still and video cameras also contain cards to store images. Understanding how all of these devices are formatted and how to get data from them is critical to a forensic investigator. Both law enforcement and corporate investigators need to understand the value and techniques of searching for evidence of crime or intrusions on computer systems. [Read more…]

O’Reilly – Forensic Analysis of Computer Memory

O’Reilly – Forensic Analysis of Computer Memory
English | Size: 658.65 MB
Category: CBTs

Our connected world today generates unimaginable volumes of data, and sometimes that information can be the key to helping law enforcement and corporate investigators solve crimes or reveal intrusions by hackers into a network. Memory analysis is important for incident responders and cases for which there is essential evidence that could be lost when a system is powered off. Fortunately, there are a number of tools that we can use to help with memory analysis. [Read more…]

O’Reilly – Capture and Analysis of Network-based Evidence

O’Reilly – Capture and Analysis of Network-based Evidence
English | Size: 715.24 MB
Category: CBTs

In our globally connected and online world today, massive amounts of data flow across countless networks. Much of that data is ephemeral, meaning that after it has passed across the network, it’s gone. For law enforcement and IT professionals who are engaged in digital forensic investigations, understanding how to read the data transmitted on a network is crucial to carrying out their task. This is especially important in the case of incident response and corporate investigations and can help in identifying unauthorized intrusions on a network. [Read more…]

Lynda – Excel Scenario Planning and Analysis

Lynda – Excel Scenario Planning and Analysis
English | Size: 266.87 MB
Category: Tutorial

A multitude of factors can affect the trajectory of your business. Learning how to document, summarize, and present projected business scenarios can help provide a basis for insightful business analysis, and help you evaluate the impact of various choices on your organization. In this course, explore techniques for analyzing a series of business scenarios using the flexible and powerful capabilities built into Excel. The course starts with a chapter on the art and craft of scenario planning before turning to the technical capabilities of Excel. Tools covered include row grouping to show and hide detail, PivotTables, and functions for using the normal distribution. [Read more…]