Table of contents: 1. Introduction 2. The rise of the digital dossier 3. Kafka and Orwell : reconceptualizing information privacy 4. The problems of information privacy law 5. The limits of market-based solutions 6. Architecture and the protection of privacy 7. The problem of public records 8. Access and aggregation : rethinking privacy and transparency 9. Government information gathe…
Table of contents Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows Filesystems 179 C…
Table of contents: 1. Introduction 2. Technologies of Freedom 3. The Commission 4. Into the Labyrinth 5. Cable 6. The Airwaves Unbound 7. Wire Unbound 8. Busting Trusts 9. The Ascent of Competition 10. Pricing 11. Universal Service 12. Common Carriage 13. Reassembling the Pieces 14. Free Speech 15. Speech for Sale 16. Privacy 17. A People's C…
Table of contents: Digital investigation foundations Computer foundations Hard disk data acquisition Volume analysis PC-based partitions Server-based partitions Multiple disk volumes File system analysis FAT concepts and analysis FAT data structures NTFS concepts NTFS analysis …
Contents: 1. Introduction Information privacy, technology, and the law Information privacy law : origins and types Perspectives on privacy 2. Privasi and law enforcement The Fourth Amendment and emerging technology Federal electronic surveillance law Digital searches and seizures National security and foreign intelligence 3. Privacy and goverenment records and d…
Table of contents: 1. An overview of the technology policy environment in the United States 2. The international technology policy environment 3. Fundamental requirements for patent protection in the United States 4. Obtaining and defending patent rights in the United States and globally 5. Patent protection for computer programs and internet business methods 6. Protection of secret infor…
Table of contents: 1. Understanding file systems and hard disks 2. Understanding digital media devices 3. Windows, Lunux, and Macintosh boot processes 4. Windows forensics I 5. Windows forensics II 6. Linux forensics 7. Application password crackers
Daftar isi: BAB 1 Konsep e-learning BAB 2 Komunikasi synchronous & asynchronous BAB 3 Interaktivitas BAB 4 User dalam e-learning BAB 5 Penerapan teori pembelajaran dalam e-learning BAB 6 Strategi pembelajaran dalam e-learning BAB 7 Aplikasi mendukung e-learning
Contents: ch. 1 Introduction to Critical Infrastructure Assurance and Protection 1.1.Introduction 1.2.What Is Critical Infrastructure? 1.3.What Is the Private Sector? 1.4.What Is the Public Sector? 1.5.What Is CIP? 1.6.What Is CIA? 1.7.What Are Public-Private Partnerships? 1.8.Critical Infrastructure Functions 1.9.Evolution of Critical Infrastructure ch. 2 Demand, Capacity, Fragili…
Ch 1 Introduction to e-discovery and digital evidence Ch 2 A brief history of e-discovery Ch 3 E-discovery planning and tools Ch 4 Experts: the right person for the right job Ch 5 Digital evidence case flow Ch 6 Case study: from beginning to trial Ch 7 Information governance and litigation preparedness Ch 8 Researching e-discovery case law Ch 9 The future of e-discovery