تبلیغات
Computer Book - مطالب ابر internet

COLLECTION OF VIDEO COMPUTER, IT, INTERNET, VIDEO GAME, HACKING AND FILE-SHARING FULL

نوشته شده در تاریخ : شنبه 26 آذر 1390   05:01 ب.ظ


Collection of video Computer, IT, Internet, Video Game, Hacking and File-Sharing Full
Language: English
AVI | XviD 1191kbps | 624 x 336 25fps | MP3 128kbps | 5.08 GB

Genre: e-Learning

A collection of 54 computer, IT, internet, video game, hacking, file sharing and related documentaries.
These are all encoded as Xvid avi’s with mostly MP3 audio but at different bitrates.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: COMPUTER، IT، INTERNET، VIDEO GAME، HACKING AND FILE-SHARING FULL،

Digital Forensics for Network, Internet, and Cloud Computing

نوشته شده در تاریخ : یکشنبه 9 مرداد 1390   04:47 ق.ظ

نوع مطلب :Cloud ،شبکه ،

1579002072 Digital Forensics for Network, Internet, and Cloud Computing

Book Description
 forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from  traffic. This book will help  and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in -based technology (e.g.,  networks,  , telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists.

  • Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering.
  • The current and future states of network forensics analysis tools are addressed.
  • The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Cloud، Computing، internet، Networking، TCP/IP،

Complete Web Monitoring

نوشته شده در تاریخ : شنبه 8 مرداد 1390   04:18 ب.ظ

نوع مطلب :توسعه وب ،Cloud ،

1599835598 Complete Web Monitoring

Book Description
Do you really understand your  presence? Are you confident that visitors can use your website? Do you know their motivations? How do  communities perceive your company? To innovate and adapt your  quickly, you must know the answers to these questions. Complete  Monitoring demonstrates how to measure every aspect of your  presence — including analytics, backend performance, usability, communities, customer feedback, and competitive analysis — whether you’re running an e-commerce site, a community, a media property, or a Software-as-a-Service company. This book’s concrete examples, clear explanations, and practical recommendations make it essential for anyone who runs a website. With this book you will:


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: administrator، Business، Cloud، Computer، Data، How to، internet، LinkedIn، Linux، Management، Music، Online، optimization، social، Testing، Twitter، web،

Digital Forensics for Network, Internet, and Cloud Computing

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   10:02 ب.ظ

نوع مطلب :شبکه ،

1579002072 Digital Forensics for Network, Internet, and Cloud Computing

Book Description
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in -based technology (e.g., social networks,  , telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists.

  • Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic , and deciphering.
  • The current and future states of network forensics analysis tools are addressed.
  • The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Cloud، Computing، internet، Networking، TCP/IP،