Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
My Time Will Come: A Memoir of Crime, Punishment, Hope, and Redemption
My Time Will Come: A Memoir of Crime, Punishment, Hope, and Redemption
The inspiring story of activist and poet Ian Manuel, who at the age of fourteen was sentenced to life in prison. He survived eighteen years in solitary confinement—through his own determination and dedication to art—until he was freed as part of an incredible crusade by the Equal Justice Initiative.
 
...
Web2Py Manual
Web2Py Manual

I am guilty! After publicly complaining about the existence of too many Python based web frameworks, after praising the merits of Django, Pylons, TurboGears, CherryPy, and web.py, after having used them professionally and taught them in University level courses, I could not resist and created one more: web2py.

Why did I commit such...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Digital Robbery: ATM Hacking and Implications (SpringerBriefs in Cybersecurity)
Digital Robbery: ATM Hacking and Implications (SpringerBriefs in Cybersecurity)
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators
Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators

The First Practical Guide to the Use of Photoshop in Forensics Investigations

This timely book is the first to take the forensic use of digital imaging out of the classroom and into the real world for law enforcement, legal, and other forensics professionals. How do you show the exact position or...

Theories of Crime Through Popular Culture
Theories of Crime Through Popular Culture

This textbook brings criminology theories to life through a wide range of popular works in film, television and video games including 13 Reasons Why, Game of Thrones, The Office, and Super Mario Bros, from a variety of contributors. It serves as an engaging and creative...

Let the Lord Sort Them: The Rise and Fall of the Death Penalty
Let the Lord Sort Them: The Rise and Fall of the Death Penalty
NEW YORK TIMES EDITORS’ CHOICE • A deeply reported, searingly honest portrait of the death penalty in Texas—and what it tells us about crime and punishment in America

“If you’re one of those people who despair that nothing changes, and dream that something can, this is a story of
...
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Contrast Data Mining: Concepts, Algorithms, and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Contrast Data Mining: Concepts, Algorithms, and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

A Fruitful Field for Researching Data Mining Methodology and for Solving Real-Life Problems
Contrast Data Mining: Concepts, Algorithms, and Applications collects recent results from this specialized area of data mining that have previously been scattered in the literature, making them more accessible to
...

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy