Browse Results

Showing 24,576 through 24,600 of 54,505 results

Blue Team Field Manual (RFTM Series)

by Alan White Ben Clark

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

Hash Crack: Password Cracking Manual (V3 Series)

by Joshua Picolet

The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization's posture. The Hash Crack manual contains syntax and examples for the most popular cracking and analysis tools and will save you hours of research looking up tool usage. It also includes basic cracking knowledge and methodologies every security professional should know when dealing with password attack capabilities. Hash Crack contains all the tables, commands, online resources, and more to complete your cracking security kit. This version expands on techniques to extract hashes from a myriad of operating systems, devices, data, files, and images. Lastly, it contains updated tool usage and syntax for the most popular cracking tools.

How To Hack Like A God: Master The Secrets Of Hacking Through Real Life Scenarios (Hack The Planet Ser.)

by Sparc Flow

Follow me on a step-by-step hacking journey where we pwn a high-profile fashion company. From zero initial access to remotely recording board meetings, we will detail every custom script and technique used in this attack, drawn from real-life findings, to paint the most realistic picture possible. Whether you are a wannabe pentester dreaming about real-life hacking experiences or an experienced ethical hacker tired of countless Metasploit tutorials, you will find unique gems in this book for you to try: -Playing with Kerberos -Bypassing Citrix & Applocker -Mainframe hacking -Fileless WMI persistence -NoSQL injections -Wiegand protocol -Exfiltration techniques -Antivirus evasion tricks -And much more advanced hacking techniques I have documented almost every tool and custom script used in this book. I strongly encourage you to test them out yourself and master their capabilities (and limitations) in an environment you own and control. Hack (safely) the Planet! (Previously published as How to Hack a Fashion Brand)

The Internet: The Missing Manual (Missing Manual)

by David Pogue J. D. Biersdorfer

The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?This utterly current book covers:Getting Online. Readers will have all the information they need to decide what kind of broadband connection works best for them, which browser they should use, and what kind of spyware-fighting and virus-and spam-protection measures they need to protect themselves.Finding Information. Google may be the leading search site, but it's certainly not the only game in town. This book introduces a diverse and useful collection of sites that help uncover everything from health care information, to shopping, travel and finance, to dependable reviews and ratings.Movies, music, and photos. The Web's teeming with entertainment--and not just the sort of postage-stamp sized videos that only a geek could love. Learn where to download movies, watch TV online, listen to music, play games, and post and share photos with friends.Keeping in touch. Email's only the beginning. This book introduces readers to the many tools that make the modern Internet such a great way to stay connected. From Web-based discussion groups to instant messaging programs, and from blogs and podcasts to Internet-based phone calls, this book will help you join the conversation.Ideal for anyone just venturing into cyberspace, this book is also perfect for more experienced users who could use an update to today's most exciting internet applications.

CEH v10 Certified Ethical Hacker Study Guide

by Ric Messier

As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.

CompTIA PenTest+ Practice Tests: Exam PT0-001

by Crystal Panek Robb Tracy

The must-have test prep for the new CompTIA PenTest+ certification CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cognitive and hands-on skills are required worldwide to responsibly perform assessments of IT systems, identify weaknesses, manage the vulnerabilities, and determine if existing cybersecurity practices deviate from accepted practices, configurations and policies. Five unique 160-question practice tests Tests cover the five CompTIA PenTest+ objective domains Two additional 100-question practice exams A total of 1000 practice test questions This book helps you gain the confidence you need for taking the CompTIA PenTest+ Exam PT0-001. The practice test questions prepare you for test success.

Building Java Programs: A Back to Basics Approach

by Stuart Reges Marty Stepp

The authors' proven and class-tested "back to basics" approach introduces programming fundamentals first, with new syntax and concepts added over multiple chapters, and object-oriented programming discussed only once readers have developed a basic understanding of Java programming.

DevOps in Python: Infrastructure as Python

by Moshe Zadka

Explore and apply best practices for efficient application deployment. This book draws upon author Moshe Zadka's years of Dev Ops experience and focuses on the parts of Python, and the Python ecosystem, that are relevant for DevOps engineers. You'll start by writing command-line scripts and automating simple DevOps-style tasks. You'll then move on to more advanced cases, like using Jupyter as an auditable remote-control panel, and writing Ansible and Salt extensions. This work also covers how to use the AWS API to manage cloud infrastructure, and how to manage Python programs and environments on remote machines.Python was invented as a systems management language for distributed operating systems, which makes it an ideal tool for DevOps. ​Assuming a basic understanding of Python concepts, this book is perfect for engineers who want to move from operations/system administration into coding. What You'll LearnUse third party packages and create new packagesCreate operating system management and automation code in PythonWrite testable code, and testing best practicesWork with REST APIs for web clientsWho This Book Is ForJunior or intermediate sysadmin who has picked up some bash and Python basics.

Technology and the Intelligence Community: Challenges And Advances For The 21st Century (Advanced Sciences and Technologies for Security Applications)

by Margaret E. Kosal

This volume examines the role of technology in gathering, assimilating and utilizing intelligence information through the ages. Pushing the boundaries of existing works, the articles contained here take a broad view of the use and implementation of technology and intelligence procedures during the cold war era and the space race, the September 2011 attacks, and more recent cyber operations. It looks at the development of different technologies, procedural implications thereof, and the underlying legal and ethical implications. The findings are then used to explore the future trends in technology including cyber operations, big data, open source intelligence, smart cities, and augmented reality. Starting from the core aspects of technical capabilities the articles dig deeper, exploring the hard and soft infrastructure of intelligence gathering procedures and focusing on the human and bureaucratic procedures involved therein.Technology and innovation have played an important role in determining the course of development of the intelligence community. Intelligence gathering for national security, however, is not limited only to the thread of technical capabilities but is a complex fabric of organizational structures, systemic undercurrents, and the role of personnel in key positions of decision making. The book’s findings and conclusions encompass not just temporal variation but also cut across a diverse set of issue areas. This compilation is uniquely placed in the interdisciplinary space combining the lessons from key cases in the past to current developments and implementation of technology options.

Digital Turn in Schools—Research, Policy, Practice: Proceedings of ICEM 2018 Conference (Lecture Notes in Educational Technology)

by Terje Väljataga Mart Laanpere

This volume is a compilation of selected papers that were presented at the annual conference of the International Council of Educational Media (ICEM) in Tallinn, Estonia, on September 5 - 7, 2018. The book reports on recent interdisciplinary research and innovative practices regarding school-wide implementation of digital innovation and connects it with recent developments in the field of educational media. The key concept is “Digital Turn,” which is understood as a socio-technical transition towards next-generation digital learning ecosystems in education. Although Digital Turn can also be implemented at the classroom or national levels, most of the contributions in this volume take a whole-school perspective on the policies and practices regarding digital innovation, educational media, e-assessment, digital competences of teachers and students as well as learning design and learning analytics.

GitHub For Dummies

by Guthals Phil Haack

Code collaboratively with GitHub Once you’ve learned the basics of coding the next step is to start sharing your expertise, learning from other coding pros, or working as a collaborative member of development teams. GitHub is the go-to community for facilitating coding collaboration, and GitHub For Dummies is the next step on your journey as a developer. Written by a GitHub engineer, this book is packed with insight on how GitHub works and how you can use it to become a more effective, efficient, and valuable member of any collaborative programming team. Store and share your work online with GitHub Collaborate with others on your team or across the international coding community Embrace open-source values and processes Establish yourself as a valuable member of the GitHub community From setting up GitHub on your desktop and launching your first project to cloning repositories, finding useful apps on the marketplace, and improving workflow, GitHub For Dummies covers the essentials the novice programmer needs to enhance collaboration and teamwork with this industry-standard tool.

Pro MERN Stack: Full Stack Web App Development with Mongo, Express, React, and Node

by Vasan Subramanian

Assemble the complete stack required to build a modern web app using MongoDB, Express, React, and Node. This book also covers many other complementary tools: React Router, GraphQL, React-Bootstrap, Babel, and Webpack. This new edition will use the latest version of React (React 16) and the latest React Router (React Router 4), which has a significantly different approach to routing compared to React Router 2 which was used in the first edition of the book.Though the primary focus of Pro MERN Stack is to equip you with all that is required to build a full-fledged web application, a large portion of the book will be devoted to React 16. The popular MEAN (MongoDB, Express, AngularJS, Node) stack introduced Single Page Apps (SPAs) and front-end Model-View-Controller (MVC) as new and efficient paradigms. Facebook's React is a technology that competes indirectly with AngularJS. It is not a full-fledged MVC framework. It is a JavaScript library for building user interfaces (in some sense the View part). Yet, it is possible to build a web app by replacing AngularJS with React – hence the term MERN stackWhat You Will LearnDiscover the features of React 16 to get the maximum out of this libraryGain the basics of MongoDB, Express, and Node to build a web appWork with other libraries complementary to React, including React-Bootstrap, React Router, and GraphQLUse tools such as Babel and Webpack required to build JavaScript-based SPAs Tie all the components together to build a complete web app.Who This Book Is ForDevelopers and architects who have prior experience in any web app stack other than the MERN stack will find the book useful to learn about this modern stack. Prior knowledge of JavaScript, HTML, and CSS is required.

Hands-On Functional Test Automation: With Visual Studio 2017 and Selenium

by Chaminda Chandrasekara Pushpa Herath

Get started with functional testing of both web apps and Windows apps using different test frameworks. This book will take you on a deep dive into integrating functional automation testing with deployment pipelines.Hands-On Functional Test Automation contains step-by-step lessons that will give you an understanding of how to do functional test automation using Selenium with C# and Python. Also, you will learn how to enhance your test automation development with third-party frameworks. You will configure test clients, run functional tests through Azure DevOps release management, and carry out performance and load-testing to gain a good understanding of how to do cloud-based load testing.Each lesson comprises an introduction to the related concepts to help you understand how things work. This will broaden your knowledge so you can implement test automation in the correct way. At the end of each lesson alternative options and other enhancement possibilities are discussed to allow you to do further exploration. You will:· Implement functional test automation of Windows and web applications· Use Visual Studio for load and performance testing · Configure and run cloud-based load testing· Integrate testing with deployment pipelines

Modeling Communication Networks and Protocols: Implementation via the SMURPH System (Lecture Notes in Networks and Systems #61)

by Paweł Gburzyński

This book provides an introduction to the software system SMURPH, comprising a programming language, its compiler, and an execution environment, for specifying communication networks and protocols and executing those specifications in virtual worlds mimicking the behavior of real-life implementations. It particularly focuses on SMURPH’s wireless modeling capabilities. Written in a manual-like fashion, it includes a comprehensive description of SMURPH functionality, as well as illustrations and case studies to aid understanding.

Tools and Algorithms for the Construction and Analysis of Systems: 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part III (Lecture Notes in Computer Science #11429)

by Dirk Beyer Marieke Huisman Fabrice Kordon Bernhard Steffen

This book is Open Access under a CC BY licence. This book, LNCS 11429, is part III of the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019. It's a special volume on the occasion of the 25 year anniversary of TACAS.

Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers (Communications in Computer and Information Science #939)

by Sukumar Nandi Devesh Jinwala Virendra Singh Vijay Laxmi Manoj Singh Gaur Parvez Faruki

This book constitutes the refereed proceedings of the Second International Conference on Security and Privacy, ISEA-ISAP 2018, held in Jaipur, India, in January 2019. The conference was originally planned to be held in 2018 which is why the acronym contains "2018". The 21 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections: authentication and access control, malware analysis, network security, privacy preservation, secure software systems and social network analytics.

Google Power Search: The Essential Guide To Finding Anything Online With Google

by Stephan M. Spencer

What would happen to your productivity if your Web searches always quickly returned the most relevant results? Over the course of a year, you could recover days of time wasted on inefficient searches and irrelevant results; and by mastering Google's search refinement operators and lesser-known features, hard-to-find information such as market research and competitive intelligence would become accessible to you. This book will show you how to find what you need quickly and accurately.

Ubuntu Linux: Learn Administration, Networking, and Development Skills With The #1 Linux Distribution!

by Jerry Banfield Nick Germaine

If you want to learn Ubuntu Linux, I think you might love this book! Here is what each section of the book focuses on! Getting started with Ubuntu Linux. Introduction to Ubuntu Linux and getting started as a power user. What are Linux distributions? Installing Ubuntu in a virtual machine. Installing virtualbox and setting up your virtual machine. Installing Ubuntu Linux on your virtual machine. Setting up Ubuntu linux on your virtual machine. Disabling the iso & first boot up. Optimizing Ubuntu & customizing your desktop. Installing virtualbox/guest additions for a better user experience. Customizing your Ubuntu desktop. Installing the unity tweak tool for Ubuntu. Installing Ubuntu. Installing Ubuntu alongside windows on your hard drive. Reboot your computer using Ubuntu. Getting started with the Linux command line. Administrative privileges in the Linux terminal. Using the package manager to install new applications. Searching the repository to find new applications to download. Installing a package not in the repositories. Keeping programs updated in Ubuntu Linux. File permissions and ownership. Operations and ownership. Create a new file in the terminal. Creating new directories and moving files. Copying, renaming and removing files. Moving on to more advanced commands in the terminal. Getting started with the find command. The find command. Introduction to the grep command. Grep. How to redirect the output of a command. Using the top command to view applications. How to view the entire list of processes and closing applications. What is a service? Configuring services using the command line. Using crontabs and cronjobs. The practical applications of crontabs. Ubuntu Linux developer tools: get started as a freelancer today! Choosing an integrated development environment (ide). Eclipse installation and setup. Pycharm installation and setup. Pycharm installation problem resolved. Introduction to github, installation, and setting up a repository. How to pull and push information from your repository. How to remove or ignore directories in your repository. How to resolve conflicts from the command line. How to set up and manage branches. Making comments in python. Getting started with meteor: installation and adding packages. Meteor tutorial part 1: setting up your first project. Meteor part 2: setting up your router and react components. Meteor tutorial part 3: programming. Meteor tutorial part 4: rendering posts. Meteor tutorial part 5: putting on the finishing touches. Apache 2, php 5 and mysql installation. Getting started with your server configuration. What is the hosts file on a Linux system? Deploying the meteor to an apache 2 server. Setting up mongodb nosql database. Creating a virtual host. Using a shell script to set environment variables. Installing and configuring phpmyadmin. Take a tour around the phpmyadmin panel. Creating a basic virtual host. Setting up a WordPress installation on top of apache 2. Set up the database in WordPress. Python installation and command line interface. What are the practical applications of python? Managing users, permissions, and groups. Adding new users through terminal. Deleting users through terminal. How to change an existing user’s password. Adding users to a group and why it’s valuable. Linux network administration tools. Introduction to networking. How does the internet work? What is a local network? Practical networking commands. Using the netstat command to track detailed network statistics. An in-depth look at the Linux hosts file. Thank you for reading this and I hope you enjoy the book!

Alliance Capitalism, Innovation and the Chinese State: The Global Wireless Sector (International Political Economy Series)

by Victoria Higgins

This book analyses how key 'systems integration' technical pressures, and the increasing use of collaborative alliances for market and product development are impacting on the socio technical policy directives of Chinese State leaders and the strategic behaviour of key Chinese high technology firms operating in the global wireless sector.

Vulnerability Management

by Park Foreman

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA (Advances in Intelligent Systems and Computing #960)

by Tareq Ahram Waldemar Karwowski

This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a broad range of topics, including methods for human training; novel cyber-physical and process-control systems; social, economic, and behavioral aspects of cyberspace; issues concerning the cybersecurity index; security metrics for enterprises; and risk evaluation. Based on the AHFE 2019 International Conference on Human Factors in Cybersecurity, held on July 24-28, 2019, in Washington D.C., USA, the book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems, and future challenges that may be successfully overcome with the help of human factors research.

Road Terrain Classification Technology for Autonomous Vehicle (Unmanned System Technologies)

by Shifeng Wang

This book provides cutting-edge insights into autonomous vehicles and road terrain classification, and introduces a more rational and practical method for identifying road terrain. It presents the MRF algorithm, which combines the various sensors’ classification results to improve the forward LRF for predicting upcoming road terrain types. The comparison between the predicting LRF and its corresponding MRF show that the MRF multiple-sensor fusion method is extremely robust and effective in terms of classifying road terrain. The book also demonstrates numerous applications of road terrain classification for various environments and types of autonomous vehicle, and includes abundant illustrations and models to make the comparison tables and figures more accessible.

Visual and Text Sentiment Analysis through Hierarchical Deep Learning Networks (SpringerBriefs in Computer Science)

by Arindam Chaudhuri

This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Further, it analyses sentiments in Twitter blogs from both textual and visual content using hierarchical deep learning networks: hierarchical gated feedback recurrent neural networks (HGFRNNs). Several studies on deep learning have been conducted to date, but most of the current methods focus on either only textual content, or only visual content. In contrast, the proposed sentiment analysis model can be applied to any social blog dataset, making the book highly beneficial for postgraduate students and researchers in deep learning and sentiment analysis. The mathematical abstraction of the sentiment analysis model is presented in a very lucid manner. The complete sentiments are analysed by combining text and visual prediction results. The book’s novelty lies in its development of innovative hierarchical recurrent neural networks for analysing sentiments; stacking of multiple recurrent layers by controlling the signal flow from upper recurrent layers to lower layers through a global gating unit; evaluation of HGFRNNs with different types of recurrent units; and adaptive assignment of HGFRNN layers to different timescales. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis. The proposed method yields promising results from Twitter datasets that include both texts and images, which support the theoretical hypothesis.

Los siete hábitos de la gente desinformada: Cómo informarse y tomar decisiones en las redes sociales

by Marc Argemí Ballbé

Vivimos el espejismo de creer que, como hemos consultado internet, estamos lo suficientemente informados para tomar buenas decisiones. Sin embargo, esta idea es errónea. Este libro permite identificar los hábitos que nos hacen más vulnerables a la desinformación en el entorno digital y ofrece las herramientas para decidir por nosotros mismos tanto en el terreno personal como profesional. Estar bien informado significa contar con suficientes datos para, de entre todas las decisiones posibles, poder elegir una. Sin embargo, la experiencia nos demuestra que muchas decisiones tomadas con seguridad están lejos de sustentarse en los datos, circunstancia que explica que podamos parecer al mismo tiempo unos perfectos ignorantes y muy decididos. Internet y las redes sociales han llevado esta problemática hasta el extremo. Nunca antes habíamos tenido acceso a tanta información, aunque esto no implica que seamos capaces de escoger mejor. Los algoritmos del entorno digital (donde conviven webs, Facebook, Instagram, Twitter o WhatsApp) no siempre están programados para ayudarnos a elegir de forma adecuada. Tenemos la engañosa percepción de que estamos bien informados y, por ello, decidimos correctamente. No obstante, la desinformación nos afecta en nuestra vida personal y profesional. ¿Soy víctima de este fenómeno? La respuesta, con toda probabilidad, sería afirmativa porque nos desinformamos con facilidad y de modos muy diversos. El objetivo de este libro es ayudar a identificar los hábitos que nos hacen más vulnerables: el cuñadismo, la incredulidad crédula, la indecisión crónica, la ansiedad, el confusionismo relacional, el activismo visceral y la precariedad informativa. Y, con sus herramientas prácticas para contrarrestar la desinformación, será de utilidad tanto para los expertos en redes sociales y profesionales de la gestión de cuentas en Twitter como para aquellas personas que solo visitan las páginas web de los periódicos de toda la vida.

Battlefield Forensics for Persian Gulf States: Regional and U.S. Military Weapons, Ammunition, and Headstamp Markings

by Don Mikko William Bailey

Battlefield Forensics for Persian Gulf States provides an illustrative reference of various weapons, toolmarks, headstamps, and other traits in order to identify the origins of a variety of guns, casings, and ammunition that can be found in the Middle East. Various conflicts in the region have led to innumerable weapons being used throughout the years. The lead author, Don Mikko, has investigated and examined firearms related items of evidence in countless crime scenes throughout the world. As the Chief of the Firearms Branch at the United States Army Criminal Investigation Laboratory (USACIL), Fort Gillem, Georgia, he recruited, trained, and competency tested military contractors deploying to various combat related areas of the world, those providing forensic firearm and toolmark identification support to local commanders. What was learned was that various foreign weapons and ammunition were being utilized in conflicts and by opposing forces. This book educates readers on the technical data for different types of firearms, ammunition, countries of origin, proof marks, penetrator information and the typical firearm markings imparted on fired cartridge cases, such as breech-face, firing pin, ejector, and extractor markings. Forensics and biometrics within the Persian Gulf have been leveraged since the early 1990s and many of the firearms and types of ammunition covered in this handbook are addressed in an effort to assist those on the ground who are required to be able to identify such items in various scenarios. The information contained within the book has proven to be effective on the battlefield and has helped shape combat operations. This handbook will serve as a useful reference not only to assist military and contractor personnel within the various combat locations but will also prove to be beneficial for law-enforcement, crime laboratory personnel, forensic firearm and toolmark examiners, crime scene investigators, students, practitioners, and civilian personnel throughout the world.

Refine Search

Showing 24,576 through 24,600 of 54,505 results