|
|
|
Cybercrime and SocietyCriminology has been rather slow to recognise the importance of cyberspace in changing the nature and scope of offending and victimisation, and a comprehensive introductory textbook on cybercrime and its social implications is long overdue. One of the many strengths of Majid Yar's book is that it avoids 'techy' jargon and unites criminological and... | | How to Do Everything with Online VideoYou’re just in time. The online video revolution is under way. Yeah, yeah, I know. Another revolution. It seems like we have a new revolution every 18 months or so. And that’s why you’re just in time. This revolution is gaining momentum, establishing its foundations, and becoming focused. You know something is going on right in... | | Advanced Automotive Fault Diagnosis, Second EditionThe aspect I still enjoy most about working on vehicles is being able to diagnose a fault that has beaten others! This skill takes a few years to develop but it is worth the effort. Diagnostic work is much like that of a detective solving a difficult crime, all the clues are usually there – if you know where to look. I think it was Sherlock... |
|
Unsolved Crimes (Criminal Investigations)In "Unsolved Crimes", famous, unresolved cases from the past 120 years are examined to review what police and experts in forensic science did (or failed to do) while trying to resolve each crime. For each case covered, the key theories and suspects are described. Though technology is much improved since the time of Jack the Ripper in... | | Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... | | Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)Moore explains the difficulties in applying traditional Fourth Amendment jurisprudence several of the more common warrantless search doctrines, in order to determine what aspects of traditional search and seizure doctrine apply to crimes involving technology. To amplify his points, he discusses several high technology crimes. Additionally, he... |
|
| | Blown to Bits: Your Life, Liberty, and Happiness After the Digital ExplosionEvery day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,... | | |
|
Result Page: 22 21 20 19 18 17 16 15 14 13 |