Thursday, January 8, 2009

Foundation Silverlight 2 Animation or File System Forensic Analysis

Foundation Silverlight 2 Animation

Author: Jeff Paries

Silverlight is Microsoft's breakthrough technology for creating rich experiences on the web. This book illustrates the power of Silverlight as a graphics, animation, and game-creation tool. It teaches the fundamentals of computer animation, using trigonometry and vector movement before moving on to more advanced topics such as physics modeling and particle systems.

With full code examples for all types of animation and interaction, this is an invaluable resource for both Silverlight beginners and more advanced users.

What you'll learn

  • Learn how to create programmatic animation in Silverlight
  • Revise the math of trigonometry and vectors to create motion
  • Create animated text and image effects such as blurs and drop shadows
  • Add physics effects, such as gravity
  • Experiment with kinematics to create walk cycles
  • Play with particle systems to create simple explosions
  • Who is this book for?

    Anybody interested in Silverlight can pick up this book and be productive. Similarly, those with some web development experience looking to add Silverlight applications to their site can be productive. More advanced users can extract the concepts presented and apply them in their own applications as well.



    New interesting book: MacroƩconomie

    File System Forensic Analysis

    Author: Brian Carrier

    The Definitive Guide to File System Analysis: Key Concepts, Hands-on Techniques

    Most digital forensics evidence is stored within the computer's file system, but working with file systems is the most technically challenging aspect of forensic analysis. Now, world-renowned expert Brian Carrier has written the definitive reference and "cookbook" for everyone who must perform reliable, legally defensible file system analysis.

    Carrier begins with an authoritative, comprehensive overview of contemporary file systems and disk layouts: crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Next, he shows how to use today's most valuable open source file system analysis tools—including tools he personally developed. Carrier's techniques address six leading file systems found on today's Windows, UNIX, and Linux systems: FAT, NTFS, Ext2, Ext3, UFS1, and UFS2. Coverage includes

    • Preserving the digital crime scene and duplicating hard disks for "dead analysis"

    • Acquiring data safely without diminishing its value as evidence

    • Identifying hidden data on a disk's Host Protected Area (HPA)

    • Reading source data: direct versus BIOS access, dead versus live acquisition, error handling, and more

    • Analyzing contents of both PC-based and server-based partitions

    • Working with systems containing multiple disk volumes

    • Key concepts, data structures, and specific techniques for analyzing Windows, UNIX, and Linux file systems

    • Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools

    When it comes to file system analysis, no other bookoffers this much detail—or this much specific, usable help. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, you'll rely on it constantly.



    Table of Contents:
    Ch. 1Digital investigation foundations3
    Ch. 2Computer foundations17
    Ch. 3Hard disk data acquisition47
    Ch. 4Volume analysis69
    Ch. 5PC-based partitions81
    Ch. 6Server-based partitions111
    Ch. 7Multiple disk volumes147
    Ch. 8File system analysis173
    Ch. 9FAT concepts and analysis211
    Ch. 10FAT data structures253
    Ch. 11NTFS concepts273
    Ch. 12NTFS analysis301
    Ch. 13NTFS data structures351
    Ch. 14Ext2 and Ext3 concepts and analysis397
    Ch. 15Ext2 and Ext3 data structures449
    Ch. 16UFS1 and UFS2 concepts and analysis479
    Ch. 17UFS1 and UFS2 data structures509
    App. AThe Sleuth Kit and Autopsy537

    No comments:

    Post a Comment