Data Recovery Data Recovery

Data Recovery

    • $8.99
    • $8.99

Publisher Description

One of the greatest fears of anyone using a computer, smartphone, or tablet is the loss of their data. But there is hope, even in the worst situations. This book, written by a long-time computer science professor, department chair, and author, shows how the very complexity of modern computing devices helps make data recovery possible.

Most “lost” data can be recovered easily by the average user. The book contains numerous simple examples that illustrate the step-by-step data recovery process for the most popular computer operating systems and software. We’ll also show you how to help recover your lost data from smartphones and tablets, as well as any data you may have stored in “the cloud.”

In some cases, the problems are more complex than can reasonably be resolved by the typical user. The book also provides information on how to tell if you need expert help to solve your data recovery problems - and you’ll have enough technical background information how to judge the capability of that supposedly expert help to make sure that the data is recovered as much as humanly possible.

The author, Ronald J. Leach, recently retired as Professor and Chair Emeritus from the Department of Systems and Computer Science at Howard University, where he had taught since 1969. He received the B.S., M.S., and Ph.D. degrees from the University of Maryland at College Park and the M. S. degree in Computer Science from Johns Hopkins University. His research interests include distributed systems, performance modeling and capacity planning; and most areas of software engineering, especially software reuse, fault-tolerance, and software performance measurement and their empirical foundations. Some of his current work includes the application of computing to the social sciences, especially in the area of name matching within historical documents, using both his computer search skills and genealogical knowledge. He is an experienced cruise ship lecturer, with special emphasis on identity theft and computer forensics.

Dr. Leach is the author of seven print books: Using C in Software Design, Academic Press, Advanced Topics in UNIX, John Wiley; Object-Oriented Design and Programming in C++, Academic Press, Software Reuse: Methods, Models, and Costs, McGraw-Hill, Introduction to Software Engineering, CRC Press, Genealogy for the Information Age, Disruptive Publishing, and Relative Genealogy, Disruptive Publishing. He has recently published an ebook entitled "Identity Theft in the Cyber Age."

Dr. Leach has offered technical training and seminars on software reuse, reengineering, and testing on three continents. He is also the author or co-author of more than one hundred technical papers.

GENRE
Computers & Internet
RELEASED
2013
August 16
LANGUAGE
EN
English
LENGTH
174
Pages
PUBLISHER
Ronald J. Leach
SELLER
Draft2Digital, LLC
SIZE
7.5
MB
COMPUTER STORAGE DEVICES COMPUTER STORAGE DEVICES
2012
International Encyclopaedia of Computer Science and Technology (Computer Storage Devices) International Encyclopaedia of Computer Science and Technology (Computer Storage Devices)
2011
Mike Meyers' CompTIA A+ Guide to 802 Managing and Troubleshooting PCs, Fourth Edition (Exam 220-802) Mike Meyers' CompTIA A+ Guide to 802 Managing and Troubleshooting PCs, Fourth Edition (Exam 220-802)
2012
Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition) Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition)
2023
Linux for Small Business Owners Linux for Small Business Owners
2022
Computer Applications In Management Computer Applications In Management
2007
The 101 Most Important UNIX and Linux Commands The 101 Most Important UNIX and Linux Commands
2012
Using C in Software Design, Second Edition Using C in Software Design, Second Edition
2012
C and Linux/UNIX Commands: Two Books C and Linux/UNIX Commands: Two Books
2013
C and UNIX C and UNIX
2013
Advanced Topics In UNIX, Second Edition Advanced Topics In UNIX, Second Edition
2012
Twelve and a Half Steps to Avoid Identity Theft Twelve and a Half Steps to Avoid Identity Theft
2012