 |
|
 Principles of Cybercrime
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every... |  |  More Blood, More Sweat and Another Cup of Tea
The sequel to the bestselling memoir Blood, Sweat & Tea. Tom Reynolds is an ambulance worker. On any given day he can be attacked by strangers, sworn at by motorists, puked on, covered in blood and other much more unpleasant substances. He could help to deliver a baby in the morning and witness the last moments of a dying man in the... |  |  Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |
|
 Free Yourself From Anxiety: A self-help guide to overcoming anxiety disorders
Anxiety disorders can rob you of independence, happiness and self-esteem. This book will enable you to free yourself from the crippling effects of anxiety and to go on to a happier and more fulfilled life. The authors describe simple self-help techniques and practical tips derived from years of helping people with anxiety problems. This book... |  |  Expert SQL Server 2008 EncryptionEvery day organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, the job descriptions of SQL DBAs and developers are expanding to include encryption. Expert SQL... |  |  Professional Penetration Testing: Creating and Operating a Formal Hacking LabSave yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!
Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a... |
|
|
 Joomla! 1.5 Content AdministrationOften a company hires consultants or web developers to build a Joomla! web site, and then takes over running the site in house. If you are a content administrator concerned with creating and maintaining the 'product' of a content management site, and not modifying its code, this book is all you need.
This practical, hands-on guide will... |  |  Terrorism's Unanswered Questions (Praeger Security International)Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,... |  |  Cisco ASA Configuration (Networking Professional's Library)Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of... |
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 |