Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Batman and Ethics
Batman and Ethics

Batman has been one of the world’s most beloved superheroes since his first appearance in Detective Comics #27 in 1939. Clad in his dark cowl and cape, he has captured the imagination of millions with his single-minded mission to create a better world for the people of Gotham City by fighting crime, making use of expert...

Flask By Example
Flask By Example

Unleash the full potential of the Flask web framework by creating simple yet powerful web applications

About This Book

  • The most up-to-date book on Flask on the market
  • Create your own world-class applications and master the art of Flask by unravelling its enigma through this journey
  • ...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

How to Do Everything with Online Video
How to Do Everything with Online Video
You’re just in time. The online video revolution is under way. Yeah, yeah, I know. Another revolution. It seems like we have a new revolution every 18 months or so. And that’s why you’re just in time. This revolution is gaining momentum, establishing its foundations, and becoming focused. You know something is going on right in...
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

The Killer Book of True Crime: Incredible Stories, Facts and Trivia from the World of Murder and Mayhem
The Killer Book of True Crime: Incredible Stories, Facts and Trivia from the World of Murder and Mayhem

This book is designed to serve up a potpourri of delectable information about crime in a manner that’s entertaining, informative, and satisfying. It should be right down the average crime lover’s gurney—or rather, alley.

This book serves up crime in a variety of ways. There are Notable Quotables (quotes from...

World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Legal Knowledge and Information Systems:  JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
Legal Knowledge and Information Systems: JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
This volume contains the Proceedings of the Nineteenth JURIX Conference on Legal Knowledge and Information Systems (JURIX 2006), December 7th–9th, Université Pantheon Assas – Paris II, France. This year we hoped to put two new topics on the agenda: Artificial Intelligence in police and intelligence services and the impact of AI...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy