$3.00 x 1
Inductive Inferences
$3.00 x 1
Project Management-Birthday Party Plan
$6.00 x 1
Physician-assisted Suicide-Annotated Bibliography
$8.00 x 1
Incident Plan Summary-During POTUS Visit
$5.00 x 1
Creating Meeting Agenda
$5.00 x 1
The Myth of Lobbyists
$10.00 x 1
Applying Leadership Skills
$5.00 x 1
Crime Investigation Procedure
$5.00 x 1
Impact of Nightingale Legacy- on Nursing
$10.00 x 1
Forensic Lab Design
$15.00 x 1
Reflection on Computer Forensics Topics-CST 640
$20.00 x 1
Lab-Network Analysis-CST 640
$15.00 x 1
Lab 9-Memory Forensics-CST 640
$10.00 x 1
The Volatility Framework and PStools-CST 640
$20.00 x 1
Lab-Malware and File Analysis-CST 640
$10.00 x 1
Malware-Viruses-and File Identification-CST 640
$20.00 x 1
Lab-Browser Artifact Analysis-CST 640
$10.00 x 1
Browser Forensics-CST 640
$15.00 x 1
Lab-Disk Analysis-CST 640
$10.00 x 1
Disks and File Systems-CST 640
$15.00 x 1
Lab-Imaging-CST 640
$10.00 x 1
Imaging Tools-CST 640
$20.00 x 1
Lab-Hashing-CST 640
$10.00 x 1
Hashing Tools are Vital- Computer Forensics-CST 640
$20.00 x 1
Project 1 – A Network Intrusion-CST 640
$20.00 x 1
Lab Activity-Logs and Web Logs-CST 640
$15.00 x 1
Importance of Analyzing Logs-CST 640
$20.00 x 1
Lab Activity – Event Logs and Scheduled Tasks-CST 640
$15.00 x 1
Event Viewer – System event-CST 640