|
|
|
|
|
Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... | | PySide GUI Application Development
Newbies to GUI programming in Python will find this book indispensable. As well as the basic concepts, you'll be taught PySide in detail through practical instructions and create your own applications with customized widgets and dialogs.
Overview
-
Designed for beginners to help them get started with...
| | Disadvantaged Children in India: Empirical Evidence, Policies and Actions
This book addresses issues concerning five major categories of disadvantaged children, namely street children, children involved in trafficking, child labor, slum children, and children in institutional care, which apply to a large number of children around the world, including India. Compiling primary and secondary research-based evidences in... |
|
MySpace Unraveled: What it is and how to use it safelyDo you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech... | | Principles of Cybercrime
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every... | | Digital Evidence and Computer Crime, Second EditionDigital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an... |
|
Absolute Beginner's Guide to Windows XP Media CenterUse the Absolute Beginner's Guide to Windows XP Media Center to take the PC experience further! This book helps you unlock the potential of your Windows XP Media Center, in the fun, friendly Absolute Beginner's Guide style. This book covers everything you need to know to use your Media Center to its full potential,... | | Personality Disorders (Diseases and Disorders)Charles Best, one of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the gratification of knowing one is helping people,” he confided, “although that probably is a more heroic and selfless motivation. Those feelings may enter in, but... | | Beautiful LEGO
"Far from child's play. An astonishing collection." —Publishers Weekly
Mix hundreds of thousands of LEGO bricks with dozens of artists, and what do you get? Beautiful LEGO, a compendium of LEGO artwork that showcases a stunning array of pieces ranging from incredibly lifelike... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 |