Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
Even before the poor thing had shipped, naysayers had their fun with it: the iPad’s nothing more than an oversized iPhone. But now that we’ve all gotten are fingers on these silver-and-black beauties, this much is clear: where the iPhone’s great for the little things in life—killing boredom, local lookups, and, you...
In April 2005, I received a telephone call from Humana Press Senior Editor, Harvey Kane, inquiring whether there might be a need for a book to be published concerning the different aspects of computer forensics. During a subsequent meeting to discuss the current state of available texts covering this topic, I noted to Mr. Kane that there were...
Facebook and Philosophy is an entertaining, multi-faceted exploration of what Facebook means for us and for our relationships. With discussions ranging from the nature of friendship and its relationship to "friending," to the (debatable) efficacy of "online activism," this book is the most extensive and systematic...
This book is intended to provide comprehensive information about domestic violence; what it is, its causes, the extent of the problem, whom it affects, available services, and possible solutions. To provide the reader with a broad and in-depth view of the issue, domestic violence is explored from historical, social,...
This book is generally about software intellectual property and specifically
about the field of software forensics. While you may never testify in a courtroom,
attempt to deduce the true owner of a valuable program, or measure the
intellectual property (IP) value of software source code, if you are at all involved
with software you...
This book is intended for individuals who are interested in the iPhone and other
iOS devices and, more importantly, in the type of data that is stored and can be
recovered from these devices. The demand for mobile forensics has grown tremendously
with the release of smart phones. Communication on these devices is now
documented...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
How did British rule in India transform persons from lower social classes? Could Indians from such classes rise in the world by marrying Europeans and embracing their religion and customs? This book explores such questions by examining the intriguing story of an interracial family who lived in southern India in the mid-nineteenth century. The...
Washington, DC deserves to be called the Capital of the Free
World for at least two reasons: It’s the capital city of the
most powerful democracy on earth. And in no other place in the
world will you find more terrific things to see and do for free.
Visit the great museums and historical buildings of many...
A practical guide to best and worst practices for family businesses—from drawing up incorporation documents to succession planning to selling the business. The book also includes examples from actual court cases and presents these lessons in an accessible manner. Sample legal agreements are included which help to avoid...
Arbitration and jurisdiction agreements are frequently used in transnational commercial contracts to reduce risk, gain efficacy and acquire certainty and predictability. Because of the similarities between these two types of procedural autonomy agreements, they are often treated in a similar way by courts and practitioners.