"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian KrÃ¼ger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology.
This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime.
62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities.
The only book that covers Cybercrime from forensic investigation through prosecution.
Cybercrime is one of the battlefields in the war against terror.
Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines
A penetrating guide to artificial intelligence: what it is, what it does, and how it will change our lives
At a breathtaking pace, artificial intelligence is getting better and faster at making complex decisions. AI can already identify malignant tumors on CT scans, give legal advice, out-bluff the best...
The Parenting Skills Treatment Planner (Practice Planners) The Bestselling treatment planning system for mental health professionals
The Parenting Skills Treatment Planner provides all the elements necessary to quickly and easily develop formal treatment plans that satisfy the demands of HMOs, managed care companies, third-party payors, and state and federal review agencies.
Mastering Concurrency Programming with Java 8
Master the principles and techniques of multithreaded programming with the Java 8 Concurrency API
About This Book
Implement concurrent applications using the Java 8 Concurrency API and its new components
Improve the performance of your applications or process more data at the same time,...
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics
Beginning ASP.NET 3.5: In C# and VB (Programmer to Programmer) This book is for anyone who wants to learn how to build rich and interactive web sites that run on the Microsoft platform. With the knowledge you gain from this book, you create a great foundation to build any type of web site, ranging from simple hobby-related web sites to sites you may be creating for commercial purposes.
Anyone new to...