Foundation Silverlight 2 Animation
Author: Jeff Paries
Silverlight is Microsoft's breakthrough technology for creating rich experiences on the web. This book illustrates the power of Silverlight as a graphics, animation, and game-creation tool. It teaches the fundamentals of computer animation, using trigonometry and vector movement before moving on to more advanced topics such as physics modeling and particle systems.
With full code examples for all types of animation and interaction, this is an invaluable resource for both Silverlight beginners and more advanced users.
What you'll learn
Who is this book for?
Anybody interested in Silverlight can pick up this book and be productive. Similarly, those with some web development experience looking to add Silverlight applications to their site can be productive. More advanced users can extract the concepts presented and apply them in their own applications as well.
New interesting book: MacroƩconomie
File System Forensic Analysis
Author: Brian Carrier
The Definitive Guide to File System Analysis: Key Concepts, Hands-on Techniques
Most digital forensics evidence is stored within the computer's file system, but working with file systems is the most technically challenging aspect of forensic analysis. Now, world-renowned expert Brian Carrier has written the definitive reference and "cookbook" for everyone who must perform reliable, legally defensible file system analysis.
Carrier begins with an authoritative, comprehensive overview of contemporary file systems and disk layouts: crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Next, he shows how to use today's most valuable open source file system analysis toolsincluding tools he personally developed. Carrier's techniques address six leading file systems found on today's Windows, UNIX, and Linux systems: FAT, NTFS, Ext2, Ext3, UFS1, and UFS2. Coverage includes
Preserving the digital crime scene and duplicating hard disks for "dead analysis"
Acquiring data safely without diminishing its value as evidence
Identifying hidden data on a disk's Host Protected Area (HPA)
Reading source data: direct versus BIOS access, dead versus live acquisition, error handling, and more
Analyzing contents of both PC-based and server-based partitions
Working with systems containing multiple disk volumes
Key concepts, data structures, and specific techniques for analyzing Windows, UNIX, and Linux file systems
Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools
When it comes to file system analysis, no other bookoffers this much detailor this much specific, usable help. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, you'll rely on it constantly.
Table of Contents:
Ch. 1 | Digital investigation foundations | 3 |
Ch. 2 | Computer foundations | 17 |
Ch. 3 | Hard disk data acquisition | 47 |
Ch. 4 | Volume analysis | 69 |
Ch. 5 | PC-based partitions | 81 |
Ch. 6 | Server-based partitions | 111 |
Ch. 7 | Multiple disk volumes | 147 |
Ch. 8 | File system analysis | 173 |
Ch. 9 | FAT concepts and analysis | 211 |
Ch. 10 | FAT data structures | 253 |
Ch. 11 | NTFS concepts | 273 |
Ch. 12 | NTFS analysis | 301 |
Ch. 13 | NTFS data structures | 351 |
Ch. 14 | Ext2 and Ext3 concepts and analysis | 397 |
Ch. 15 | Ext2 and Ext3 data structures | 449 |
Ch. 16 | UFS1 and UFS2 concepts and analysis | 479 |
Ch. 17 | UFS1 and UFS2 data structures | 509 |
App. A | The Sleuth Kit and Autopsy | 537 |
No comments:
Post a Comment