Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
Whether monitoring the Internet for threats and chatter, capturing computer evidence, or crunching forensic data, Guidance Software's EnCase computer forensics software is recognized as the premier computer forensics tool on the market. For investigation professionals, EnCE certification tells the world that you've not only mastered the use of...
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Flask By Example
Flask By Example

Unleash the full potential of the Flask web framework by creating simple yet powerful web applications

About This Book

  • The most up-to-date book on Flask on the market
  • Create your own world-class applications and master the art of Flask by unravelling its enigma through this journey
  • ...
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

How to Do Everything with Online Video
How to Do Everything with Online Video
You’re just in time. The online video revolution is under way. Yeah, yeah, I know. Another revolution. It seems like we have a new revolution every 18 months or so. And that’s why you’re just in time. This revolution is gaining momentum, establishing its foundations, and becoming focused. You know something is going on right in...
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

The Killer Book of True Crime: Incredible Stories, Facts and Trivia from the World of Murder and Mayhem
The Killer Book of True Crime: Incredible Stories, Facts and Trivia from the World of Murder and Mayhem

This book is designed to serve up a potpourri of delectable information about crime in a manner that’s entertaining, informative, and satisfying. It should be right down the average crime lover’s gurney—or rather, alley.

This book serves up crime in a variety of ways. There are Notable Quotables (quotes from...

World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy