Download Free Computer Ebooks - NET BOOKS

Download Free Computer Ebooks - NET BOOKS
Add to Google Bridge and Version Cue CS3 Essential Training

Posted: 30 May 2009 05:22 PM PDT

To help CS3 users manage photos and other digital files that can become overwhelming, Adobe has introduced Bridge CS3. In Bridge and Version Cue CS3 Essential Training , instructor Ted LoCascio teaches viewers how to use Bridge to take full advantage of each application and better manage files for individual and group projects. Complementing Bridge in the file management process is Version Cue CS3, a server-based workgroup collaboration system that also works with all the CS3 applications. Exercise files accompany this training.

download links:

Computer News - May 2009

Posted: 30 May 2009 04:51 PM PDT

Computer News - May 2009

Computer News - May 2009

Computer News - Issue 209 (05/2009)
English | Pages: 56 | Scan & PDF: Antfer | PDF | 7.6 mb


Herb Schildt’s C++ Programming Cookbook

Posted: 30 May 2009 04:50 PM PDT

Herb Schildts C++ Programming Cookbook

Herb Schildt's C++ Programming Cookbook

Product Description

Legendary programming author Herb Schildt shares some of his favorite programming techniques in this high-powered C++ "cookbook." Organized for quick reference, each "recipe" shows how to accomplish a practical programming task. A recipe begins with a list of key ingredients (classes, functions, and headers) followed by step-by-step instructions that show how to assemble them into a complete solution. Detailed discussions explain the how and why behind each step, and a full code example puts the recipe into action. Each recipe ends with a list of options and alternatives that suggest ways to adapt the technique to fit a variety of situations. Whether you're a beginner or an experienced pro, you'll find recipes that are sure to satisfy your C++ programming appetite!


Eccouncil - Hacking forensic INVESTIGATOR

Posted: 30 May 2009 04:09 PM PDT

Eccouncil - Hacking forensic INVESTIGATOR

Course Description
The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Who Should Attend
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

5 days (9:00 – 5:00)

The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification.

Course Outline v2

Module I: Computer Forensics in Today’s World

* Introduction
* History of Forensics
* Definition of Forensic Science
* Definition of Computer Forensics
* What Is Computer Forensics?
* Need for Computer Forensics
* Evolution of Computer Forensics
* Computer Forensics Flaws and Risks
* Corporate Espionage Statistics
* Modes of Attacks
* Cyber Crime
* Examples of Cyber Crime
* Reason for Cyber Attacks
* Role of Computer Forensics in Tracking Cyber Criminals
* Rules of Computer Forensics
* Computer Forensics Methodologies
* Accessing Computer Forensics Resources
* Preparing for Computing Investigations
* Maintaining professional conduct
* Understanding Enforcement Agency Investigations
* Understanding Corporate Investigations
* Investigation Process
* Digital Forensics

Module II: Law And Computer Forensics

* What Is Cyber Crime?
* What Is Computer Forensics?
* Computer Facilitated Crimes
* Reporting Security Breaches to Law Enforcement
* National Infrastructure Protection Center
* Federal Statutes
* Cyber Laws
* Approaches to Formulate Cyber Laws
* Scientific Working Group on Digital Evidence (SWGDE)
* Federal Laws
* The USA Patriot Act of 2001
* Freedom of Information Act
* Building Cyber Crime Case
* How the FBI Investigates Computer Crime?
* How to Initiate an Investigation?
* Legal Issues Involved in Seizure of Computer Equipments
* Searching With a Warrant
* Searching Without a Warrant
* Privacy Issues Involved in Investigations
* International Issues Related to Computer Forensics
* Crime Legislation of EU
* Cyber Crime Investigation

Module III: Computer Investigation Process

* Investigating Computer Crime
* Investigating a Company Policy Violation
* Investigation Methodology
* Evaluating the Case
* Before the Investigation
* Document Everything
* Investigation Plan
* Obtain Search Warrant
* Warning Banners
* Shutdown the Computer
* Collecting the Evidence
* Confiscation of Computer Equipments
* Preserving the Evidence
* Importance of Data-recovery Workstations and Software
* Implementing an Investigation
* Understanding Bit-stream Copies
* Imaging the Evidence Disk
* Examining the Digital Evidence
* Closing the Case
* Case Evaluation

Module IV: Computer Security Incident Response Team

* Present Networking Scenario
* Vulnerability
* Vulnerability Statistics
* What Is an Incident?
* A Study by CERT Shows Alarming Rise in Incidents (security Breach)
* How to Identify an Incident
* Whom to Report an Incident?
* Incident Reporting
* Category of Incidents
* Handling Incidents
* Procedure for Handling Incident
* Preparation
* Identification
* Containment
* Eradication
* Recovery
* Follow up
* What Is CSIRT?
* Why an Organization Needs an Incident Response Team?
* Need for CSIRT
* Example of CSIRT
* CSIRT Vision
* Vision
* Best Practices for Creating a CSIRT
* Step 1: Obtain Management Support and Buy-In
* Step 2: Determine the CSIRT Development Strategic
* Step 3: Gather Relevant Information
* Step 4: Design your CSIRT Vision
* Step 5: Communicate the CSIRT Vision
* Step 6: Begin CSIRT Implementation
* Step 7: Announce the CSIRT
* Other Response Teams Acronyms and CSIRTs around the world
* World CSIRT

Module V: Computer Forensic Laboratory Requirements

* Budget Allocation for a Forensics Lab
* Physical Location Needs of a Forensic Lab
* Work Area of a Computer Forensics Lab
* General Configuration of a Forensic
* Equipment Needs in a Forensics Lab
* Ambience of a Forensics Lab
* Environmental Conditions
* Recommended Eyestrain Considerations
* Structural Design Considerations
* Electrical Needs
* Communications
* Basic Workstation Requirements in a Forensic Lab
* Consider stocking the following hardware peripherals
* Maintain Operating System and Application Inventories
* Common Terms
* Physical Security Recommendations for a Forensic Lab
* Fire-Suppression Systems
* Evidence Locker Recommendations
* Evidence Locker Combination Recommendations
* Evidence Locker Padlock Recommendations
* Facility Maintenance
* Auditing a Computer Forensics Lab
* Auditing a Forensics Lab
* Forensics Lab
* Mid Sized Lab
* Forensic Lab Licensing Requisite
* Forensic Lab Manager Responsibilities

Module VI: Understanding File systems and Hard disks

* Disk Drive Overview - I
* Hard Disk
* Disk Platter
* Tracks
* Tracks Numbering
* Sector
* Sector addressing
* Cluster
* Cluster Size
* Slack Space
* Lost Clusters
* Bad Sector
* Understanding File Systems
* Types of File System
* List of Disk File Systems
* List of Network file systems
* Special Purpose File systems
* Popular Linux File systems
* Sun Solaris 10 File system - ZFS
* Windows File systems
* Mac OS X File system
* CD-ROM / DVD File system
* File system Comparison
* Boot Sector
* Exploring Microsoft File Structures
* Disk Partition Concerns
* Boot Partition Concerns
* Examining FAT
* NTFS System Files
* NTFS Partition Boot Sector
* NTFS Master File Table (MFT)
* NTFS Attributes
* NTFS Data Stream
* NTFS Compressed Files
* NTFS Encrypted File Systems (EFS)
* EFS File Structure
* Metadata File Table (MFT)
* EFS Recovery Key Agent
* Deleting NTFS Files
* Understanding Microsoft Boot Tasks
* Windows XP system files
* Understanding Boot Sequence DOS
* Understanding MS-DOS Startup Tasks
* Other DOS Operating Systems
* Registry Data
* Examining Registry Data

Module VII: Windows Forensics

* Locating Evidence on Windows Systems
* Gathering Volatile Evidence
* Pslist
* Forensic Tool: fport
* Forensic Tool - Psloggedon
* Investigating Windows File Slack
* Examining File Systems
* Built-in Tool: Sigverif
* Word Extractor
* Checking Registry
* Reglite.exe
* Tool: Resplendent Registrar 3.30
* Microsoft Security ID
* Importance of Memory Dump
* Manual Memory Dumping in Windows 2000
* Memory Dumping in Windows XP and Pmdump
* System State Backup
* How to Create a System State Backup?
* Investigating Internet Traces
* Tool - IECookiesView
* Tool - IE History Viewer
* Forensic Tool: Cache Monitor
* CD-ROM Bootable Windows XP
* Bart PE
* Ultimate Boot CD-ROM
* List of Tools in UB CD-ROM
* Desktop Utilities
* File Analysis Tools
* File Management Tools
* File Recovery Tools
* File Transfer Tools
* Hardware Info Tools
* Process Viewer Tools
* Registry Tools

Module VIII: Linux and Macintosh Boot processes

* UNIX Overview
* Linux Overview
* Understanding Volumes -I
* Exploring Unix/Linux Disk Data Structures
* Understanding Unix/linux Boot Process
* Understanding Linux Loader
* Linux Boot Process Steps
* Step 1: The Boot Manager
* Step 2: init
* Step 2.1: /etc/inittab
* runlevels
* Step 3: Services
* Understanding Permission Modes
* Unix and Linux Disk Drives and Partitioning Schemes
* Mac OS X
* Mac OS X Hidden Files
* Booting Mac OS X
* Mac OS X Boot Options
* The Mac OS X Boot Process
* Installing Mac OS X on Windows XP
* PearPC
* MacQuisition Boot CD

Module IX: Linux Forensics

* Use of Linux as a Forensics Tool
* Recognizing Partitions in Linux
* File System in Linux
* Linux Boot Sequence
* Linux Forensics
* Case Example
* Step-by-step approach to Case 1 (a)
* Step-by-step approach to Case 1 ( cool.gif
* Step-by-step approach to Case 1 ©
* Step-by-step approach to Case 1 (d)
* Case 2
* Challenges in disk forensics with Linux
* Step-by-step approach to Case 2 (a)
* Step-by-step approach to Case 2 ( cool.gif
* Step-by-step approach to Case 2 ©
* Popular Linux Tools

Module X: Data Acquisition and Duplication

* Determining the Best Acquisition Methods
* Data Recovery Contingencies
* MS-DOS Data Acquisition Tools
* DriveSpy
* DriveSpy Data Manipulation Commands
* DriveSpy Data Preservation Commands
* Using Windows Data Acquisition Tools
* Data Acquisition Tool: AccessData FTK Explorer
* Acquiring Data on Linux
* dd.exe (Windows XP Version)
* Data Acquisition Tool: Snapback Exact
* Data Arrest
* Data Acquisition Tool: SafeBack
* Data Acquisition Tool: Encase
* Need for Data Duplication
* Data Duplication Tool: R-drive Image
* Data Duplication Tool: DriveLook
* Data Duplication Tool: DiskExplorer

Module XI: Recovering Deleted Files

* Introduction
* Digital Evidence
* Recycle Bin in Windows
* Recycle Hidden Folder
* Recycle folder
* How to Undelete a File?
* Tool: Search and Recover
* Tool: Zero Assumption Digital Image Recovery
* Data Recovery in Linux
* Data Recovery Tool: E2undel
* Data Recovery Tool: O&O Unerase
* Data Recovery Tool: Restorer 2000
* Data Recovery Tool: Badcopy Pro
* Data Recovery Tool: File Scavenger
* Data Recovery Tool: Mycroft V3
* Data Recovery Tool: PC Parachute
* Data Recovery Tool: Stellar Phoenix
* Data Recovery Tool: Filesaver
* Data Recovery Tool: Virtual Lab
* Data Recovery Tool: R-linux
* Data recovery tool: Drive and Data Recovery
* Data recovery tool: active@ UNERASER - DATA recovery
* Data recovery tool: Acronis Recovery Expert
* Data Recovery Tool: Restoration
* Data Recovery Tool: PC Inspector File Recovery

Module XII: Image Files Forensics

* Introduction to Image Files
* Recognizing an Image File
* Understanding Bitmap and Vector Images
* Metafile Graphics
* Understanding Image File Formats
* File types
* Understanding Data Compression
* Understanding Lossless and Lossy Compression
* Locating and Recovering Image Files
* Repairing Damaged Headers
* Reconstructing File Fragments
* Identifying Unknown File Formats
* Analyzing Image File Headers
* Picture Viewer: Ifran View
* Picture Viewer: Acdsee
* Picture Viewer: Thumbsplus
* Steganography in Image Files
* Steganalysis Tool: Hex Workshop
* Steganalysis Tool: S-tools
* Identifying Copyright Issues With Graphics

Module XIII: Steganography

* Introduction
* Important Terms in Stego-forensics
* Background Information to Image Steganography
* Steganography History
* Evolution of Steganography
* Steps for Hiding Information in Steganography
* Six Categories of Steganography in Forensics
* Types of Steganography
* What Is Watermarking
* Classification of Watermarking
* Types of Watermarks
* Steganographic Detection
* Steganographic Attacks
* Real World Uses of Steganography
* Steganography in the Future
* Unethical Use of Steganography
* Hiding Information in Text Files
* Hiding Information in Image Files
* Process of Hiding Information in Image Files
* Least Significant Bit
* Masking and Filtering
* Algorithms and Transformation
* Hiding Information in Audio Files
* Low-bit Encoding in Audio Files
* Phase Coding
* Spread Spectrum
* Echo Data Hiding
* Hiding Information in DNA
* The Steganography Tree
* Steganography Tool: Fort Knox
* Steganography Tool: Blindside
* Steganography Tool: S- Tools
* Steganography Tool: Steghide
* Steganography Tool: Digital Identity
* Steganography Tool: Stegowatch
* Tool : Image Hide
* Data Stash
* Tool: Mp3Stego
* Tool: Snow.exe
* Tool: Camera/Shy
* Steganography Detection

Module XIV: Computer Forensic Tools

* Dump Tool: DS2DUMP
* Dump Tool: Chaosreader
* Slack Space & Data Recovery Tools: Drivespy
* Slack Space & Data Recovery Tools: Ontrack
* Hard Disk Write Protection Tools: Pdblock
* Hard Disk Write Protection Tools: Nowrite & Firewire Drivedock
* Permanent Deletion of Files:pdwipe
* Disk Imaging Tools: Image & Iximager
* Disk Imaging Tools: Snapback Datarrest
* Partition Managers: PART & Explore2fs
* Linux/unix Tools: Ltools and Mtools
* Linux/UNIX tools: TCT and TCTUTILs
* Password Recovery Tool: @Stake
* ASRData
* SMART Screenshot
* Ftime
* Oxygen Phone Manager
* Multipurpose Tools: Byte Back & Biaprotect
* Multipurpose Tools: Maresware
* Multipurpose Tools: LC Technologies Software
* Multipurpose Tools: Winhex Specialist Edition
* Multipurpose Tools: Prodiscover DFT
* Toolkits: NTI tools
* Toolkits: R-Tools-I
* Toolkits: R-Tools-II
* Toolkits: DataLifter
* Toolkits: AccessData
* LC Technology International Hardware
* Screenshot of Forensic Hardware
* Image MASSter Solo and FastBloc
* RMON2 Tracing Tools and
* MCI DoStracker
* EnCase

Module XV: Application password crackers

* Password - Terminology
* What is a Password Cracker?
* How Does A Password Cracker Work?
* Various Password Cracking Methods
* Classification of Cracking Software
* System Level Password Cracking
* Application Password Cracking
* Application Software Password Cracker
* Distributed Network Attack-I
* Distributed Network Attack-II
* Passware Kit
* Accent Keyword Extractor
* Advanced Zip Password Recovery
* Default Password Database
* Password Cracking Tools List

Module XVI: Investigating Logs

* Audit Logs and Security
* Audit Incidents
* Syslog
* Remote Logging
* Linux Process Accounting
* Configuring Windows Logging
* Setting up Remote Logging in Windows
* NtSyslog
* EventReporter
* Application Logs
* Extended Logging in IIS Server
* Examining Intrusion and Security Events
* Significance of Synchronized Time
* Event Gathering
* EventCombMT
* Writing Scripts
* Event Gathering Tools
* Forensic Tool: Fwanalog
* End-to End Forensic Investigation
* Correlating Log files
* Investigating TCPDump
* IDS Loganalyais:RealSecure
* IDS Loganalysis :SNORT

Module XVII: Investigating network traffic

* Overview of Network Protocols
* Sources of Evidence on a Network
* Overview of Physical and Data-link Layer of the OSI Model
* Evidence Gathering at the Physical Layer
* Tool: Windump
* Evidence Gathering at the Data-link Layer
* Tool: Ethereal
* Tool: NetIntercept
* Overview of Network and Transport Layer of the OSI Model
* Evidence Gathering at the Network and Transport Layer-(I)
* Gathering Evidence on a Network
* GPRS Network Sniffer : Nokia LIG
* NetWitness
* McAffee Infinistream Security Forensics
* Snort 2.1.0
* Documenting the Gathered Evidence on a Network
* Evidence Reconstruction for Investigation

Module XVIII: Router Forensics

* What Is a Router?
* Functions of a Router
* A Router in an OSI Model
* Routing Table and Its Components
* Router Architecture
* Implications of a Router Attack
* Types of Router Attacks
* Denial of Service (DoS) Attacks
* Investigating Dos Attacks
* Smurfing – Latest in Dos Attacks
* Packet “Mistreating” Attacks
* Routing Table Poisoning
* Hit-and-run Attacks Vs. Persistent Attacks
* Router Forensics Vs. Traditional Forensics
* Investigating Routers
* Chain of Custody
* Incident Response & Session Recording
* Accessing the Router
* Volatile Evidence Gathering
* Router Investigation Steps - I
* Analyzing the Intrusion
* Logging
* Incident Forensics
* Handling a Direct Compromise Incident
* Other Incidents

Module XIX: Investigating Web Attacks

* Indications of a web attack
* Responding to a web attack
* Overview of web logs
* Mirrored Sites
* N-Stealth
* Investigating static and dynamic IP address
* Tools for locating IP Address: Nslookup
* Tools for locating IP Address: Traceroute
* Tools for locating IP Address:
* NeoTrace (Now McAfee Visual Trace)
* Tools for locating IP Address: Whois
* Web page defacement
* Defacement using DNS compromise
* Investigating DNS Poisoning
* SQL Injection Attacks
* Investigating SQL Injection Attacks
* Investigating FTP Servers
* Investigating FTP Logs
* Investigating IIS Logs
* Investigating Apache Logs
* Investigating DHCP Server Logfile

Module XX: Tracking E-mails and Investigating E-mail crimes

* Understanding Internet Fundamentals
* Understanding Internet Protocols
* Exploring the Roles of the Client and Server in E-mail
* E-mail Crime
* Spamming, Mail Bombing, Mail Storm
* Chat Rooms
* Identity Fraud , Chain Letter
* Sending Fakemail
* Investigating E-mail Crime and Violation
* Viewing E-mail Headers
* Examining an E-mail Header
* Viewing Header in Microsoft Outlook
* Viewing Header in Eudora
* Viewing Header in Outlook Express
* Viewing Header in AOL
* Viewing Header in Hot Mail
* Viewing Header using Pine for Unix
* Viewing Header in Juno
* Viewing Header in Yahoo
* Examining Additional Files
* Microsoft Outlook Mail
* Pst File Location
* Tracing an E-mail Message
* Using Network Logs Related to E-mail
* Understanding E-mail Server
* Examining UNIX E-mail Server Logs
* Examining Microsoft E-mail Server Logs
* Examining Novell GroupWise E-mail Logs
* Using Specialized E-mail Forensic Tools
* Tool: R-Mail
* E-Mail Examiner by Paraben
* Network E-Mail Examiner by Paraben
* Tracing Back
* Tracing Back Web Based E-mail
* Searching E-mail Addresses
* E-mail Search Site
* Handling Spam
* Network Abuse Clearing House
* Abuse.Net
* Protecting Your E-mail Address From Spam
* Tool: Enkoder Form
* Tool:eMailTrackerPro
* Tool:SPAM Punisher

Module XXI: Mobile and PDA Forensics

* Latest Mobile Phone Access Technologies
* Evidence in Mobile Phones
* Mobile Phone Forensic Examination Methodology
* Examining Phone Internal Memory
* Examining SIM
* Examining Flash Memory and Call data records
* Personal Digital Assistant (PDA)
* PDA Components
* PDA Forensics
* PDA Forensics - Examination
* PDA Forensics - Identification
* PDA Forensics - Collection
* PDA Forensics - Documentation
* Points to Be Remembered While Conducting Investigation
* PDA Seizure by Paraben
* SIM Card Seizure by Paraben (SIM Card acquisition tool)
* Forensic Tool – Palm dd (pdd)
* Forensic Tool - POSE

Module XXII: Investigating Trademark and Copyright Infringement

* Trademarks
* Trademark Eligibility and Benefits of Registering It
* Service Mark and Trade Dress
* Trademark infringement
* Trademark Search
* Copyright and Copyright Notice
* Investigating Copyright Status of a Particular Work
* How Long Does a Copyright Last?
* U.S Copyright Office
* Doctrine of “Fair Use”
* How Are Copyrights Enforced?
* SCO Vs Linux
* Line-by-Line Copying
* Plagiarism
* Turnitin
* Plagiarism detection tools
* CopyCatch
* Patent
* Patent Infringement
* Patent Search
* Case Study: Microsoft Vs Forgent
* Internet Domain Name and ICANN
* Domain Name Infringement
* Case Study: Vs
* How to check for Domain Name Infringement?

Module XXIII: Investigative Reports

* Need of an investigative report
* Report specification
* Report Classification
* Report and Opinion
* Layout of an Investigative Report
* Writing Report
* Use of Supporting Material
* Importance of Consistency
* Salient Features of a Good Report
* Investigative Report Format
* Before Writing the Report
* Writing Report Using FTK

Module XXIV: Becoming an Expert Witness

* Who Is an Expert?
* Who Is an Expert Witness?
* Role of an Expert Witness
* Technical Testimony Vs.
* Expert Testimony
* Preparing for Testimony
* Evidence Preparation and Documentation
* Evidence Processing Steps
* Rules Pertaining to an Expert Witness’ Qualification
* Importance of Curriculum Vitae
* Technical Definitions
* Testifying in Court
* The Order of Trial Proceedings
* Voir dire
* General Ethics While Testifying-i
* Evidence Presentation
* Importance of Graphics in a Testimony
* Helping Your Attorney
* Avoiding Testimony Problems
* Testifying During Direct Examination
* Testifying During Cross Examination
* Deposition
* Guidelines to Testify at a Deposition
* Dealing With Reporters

Module XXV: Forensics in action

* E-mail Hoax
* Trade Secret Theft
* Operation Cyberslam


1. Investigating Wireless Attacks

* Passive Attacks
* Netstumbler
* Active Attacks On Wireless Networks
* Rogue Access Points
* Investigating Wireless Attacks
* Airmagnet

2. Forensics Investigation Using EnCase

* Evidence File
* Evidence File Format
* Verifying File Integrity
* Hashing
* Acquiring Image
* Configuring Encase
* Encase Options Screen
* Encase Screens
* View Menu
* Device Tab
* Viewing Files and Folders
* Bottom Pane
* Viewers in Bottom Pane
* Status Bar
* Searching
* Keywords
* Adding Keywords
* Grouping
* Add multiple Keywords
* Starting the Search
* Search Hits Tab
* Search Hits
* Bookmarks
* Creating Bookmarks
* Adding Bookmarks
* Bookmarking Selected Data
* Recovering Deleted Files/folders in FAT Partition
* Recovering Folders in NTFS
* Master Boot Record
* NTFS Starting Point
* Viewing disk Geometry
* Recovering Deleted Partitions
* Hash Values
* Creating Hash Sets
* MD5 Hash
* Creating Hash
* Viewers
* Signature Analysis
* Copying Files Folders
* E-mail Recovery
* Reporting
* Encase Boot Disks
* IE Cache Images

3. First Responder Procedures

* Steps At Crime Scene
* People Involved In Incident Response
* The Role Of A System Administrator
* First Response By Non-Laboratory Staff
* Guidelines For Search And Seizure
* Planning The Search And Seizure
* Evidence Collection
* Dealing With Powered Up Computers At Seizure Time
* How To Pull The Power
* Seizing Computer Equipment
* Removable Media
* Seizing Portable Computers
* How To Remove HD From Laptops?
* Initial Interviews
* Chain Of Custody

4. Checklist for Choosing a Forensic Examiner
5. Investigation Checklist

Cinema 4D: Shattering Glass

Posted: 30 May 2009 03:50 PM PDT

Cinema 4D: Shattering Glass - Part 1 | 10mins | MP4 | 40 MB

Learn how to use AFter Effects,Cinema 4D & Illustrator to creat a realistic Shattering Glass.

In this 3 tutorial series we'll look at how to build a glass shatter effect using Illustrator, After Effects and Cinema 4D. This section includes capturing the template in After Effects, creating paths in Illustrator and setting up imported splines as polygons in Cinema 4D


The NLP Comprehensive Master Practitioner Training on DVD - Part 3: Meta-Programs with Charles Faulkner

Posted: 30 May 2009 03:50 PM PDT

The NLP Comprehensive Master Practitioner Training on DVD - Part 3: Meta-Programs with Charles Faulkner | 4.45 GB

NLP Comprehensive | AVI
Language: English

Raw and unedited – This footage is coming straight from the camera!

If you purchased the Living Encyclopedia Volume 1, you’ve enjoyed a thoroughly edited, polished, and cross referenced NLP Comprehensive Practitioner Training – a tool for both the neophyte and the master. You’ve probably already been telling your friends about it. ;-)

The response has been so strong from people who, like you, also want the Master Practitioner, and don’t want to wait for another year or so, that we have decided to offer a limited edition of the raw, unedited Master Practitioner Training DVDs.

Here’s what’s included in the whole training:

Section 1: Modeling with David Gordon
Section 2: Advanced Submodalities with Tom Best
Section 3: Meta-Programs with Charles Faulkner
Section 4: Beliefs with Adam Reynolds
Section 5: Adv. Language Patterns with Tamara Andreas
Section 6: Adv. Strategies with Charles Faulkner
Section 7: Self Concept Work with Steve Andreas


Cracking the GMAT 2009 - Princeton Review

Posted: 30 May 2009 11:16 AM PDT

Cracking the GMAT 2009 - Princeton Review | 2.37 GB

"This is the DvD that accompanies the book Cracking the GMAT 2009 Edition
This does not include the book itself.

Product Description
Cracking the GMAT offers major features on DVD, including engaging video tutorials from The Princeton Review's top instructors. We also bring you over 200 practice questions in the book and exclusive free access to 4 practice exams and expert advice online.

Of course, you'll also get all the test-prep techniques you expect from The Princeton Review. In Cracking the GMAT, we'll teach you how to think like the test writers and

·Solve complex sentence correction problems by recognizing key errors
·Crack tough data sufficiency questions using simple techniques
·Practice online with full-length tests, lessons, and drills
·Get the most out of your prep time with the study plan that's right for you

We give you plenty of practice problems to help you master our proven techniques. Our practice questions are just like those you'll see on the real GMAT–but with detailed answers and explanations for every question.

From the Inside Flap
If It’s on the GMAT, It’s in This Book

The Princeton Review realizes that acing the GMAT is very different from getting straight A’s in school. We don’t try to teach you everything there is to know about math and English–only the techniques you’ll need to score higher on the exam. There’s a big difference. In Cracking the GMAT, we’ll teach you how to think like the test writers and

-Eliminate answer choices that look right but are planted to fool you
-Raise your score by practicing with our GMAT Warm-Up Test, Scoring Guide, and Explanations
-Master even the toughest sections: Reading Comprehension, Sentence Correction, Data Sufficiency, Critical Reasoning, and more
-Practice online with full-length GMAT exams and instant score analysis

Study the techniques and strategies in this book, and then perfect your skills on more than 200 practice questions inside. We also give you four full-length practice GMAT exams on CD-ROM with instant score reporting. Our practice test questions are just like the ones you’ll see on the actual GMAT, and we fully explain every solution. –This text refers to an out of print or unavailable edition of this title.

password: merapid

The Art of Computer Virus Research and Defense

Posted: 30 May 2009 09:01 AM PDT

The Art of Computer Virus Research and Defense

The Art of Computer Virus Research and Defense

Product Description
Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and–most importantly–how to effectivelydefend against them. This book offers an encyclopedic treatment of thecomputer virus, including: a history of computer viruses, virus behavior,classification, protection strategies, anti-virus and worm-blocking techniques,and how to conduct an accurate threat analysis.

The Art of Computer VirusResearch and Defense entertains readers with its look at anti-virus research, butmore importantly it truly arms them in the fight against computer viruses.As one of the lead researchers behind Norton AntiVirus, the most popularantivirus program in the industry, Peter Szor studies viruses every day. Byshowing how viruses really work, this book will help security professionals andstudents protect against them, recognize them, and analyze and limit thedamage they can do.


Unlocking Android

Posted: 30 May 2009 09:00 AM PDT

Unlocking Android

Unlocking Android

Product Description

Android is a free, open source, Java-based mobile platform developed by Google. Unlocking Android prepares the reader to embrace the Android mobile platform in easy-to-understand language and builds on this foundation with reusable Java code examples. It’s ideal for corporate developers and hobbyists who have an interest, or a mandate, to deliver mobile software.

The book first covers the big picture so the reader can get comfortable with the Android approach to the mobile applications. Then the reader learns to apply Android by following the many practical examples. The book concludes with two deep and hands-on examples.

Unlocking Android addresses the Android application framework, its graphical capabilities and media support, data storage, communications capabilities, phone interactions, and notifications.

Unlocking Android covers Android SDK 1.x


Service-Oriented Computing (Cooperative Information Systems)

Posted: 30 May 2009 08:59 AM PDT

Service-Oriented Computing (Cooperative Information Systems)

Service-Oriented Computing (Cooperative Information Systems)

Product Description
Service-Oriented Computing (SOC) promises a world of cooperating services loosely connected, creating dynamic business processes and agile applications that span organizations and platforms. As a computing paradigm, it utilizes services as fundamental elements to support rapid, low-cost development of distributed applications in heterogeneous environments. Realizing the SOC promise requires the design of Service-Oriented Architectures (SOAs) that enable the development of simpler and cheaper distributed applications. In this collection, researchers from academia and industry report on recent advances in the field, exploring approaches, technology, and research issues related to developing SOAs.

SOA enables service discovery, integration, and use, allowing application developers to overcome many distributed enterprise computing challenges. The contributors to this volume treat topics related to SOA and such proposed enhancements to it as Event Drive Architecture (EDA) and extended SOA (xSOA) as well as engineering aspects of SOA-based applications. In particular, the chapters discuss modeling of SOA-based applications, SOA architecture design, business process management, transactional integrity, quality of service (QoS) and service agreements, service requirements engineering, reuse, and adaptation.