 |
|
|
|
 My Time Will Come: A Memoir of Crime, Punishment, Hope, and Redemption
The inspiring story of activist and poet Ian Manuel, who at the age of fourteen was sentenced to life in prison. He survived eighteen years in solitary confinement—through his own determination and dedication to art—until he was freed as part of an incredible crusade by the Equal Justice Initiative.
... |  |  Web2Py Manual
I am guilty! After publicly complaining about the existence of too many Python based web frameworks, after praising the merits of Django, Pylons, TurboGears, CherryPy, and web.py, after having used them professionally and taught them in University level courses, I could not resist and created one more: web2py.
Why did I commit such... |  |  |
|
|
 Theories of Crime Through Popular Culture
This textbook brings criminology theories to life through a wide range of popular works in film, television and video games including 13 Reasons Why, Game of Thrones, The Office, and Super Mario Bros, from a variety of contributors. It serves as an engaging and creative... |  |  Let the Lord Sort Them: The Rise and Fall of the Death Penalty
NEW YORK TIMES EDITORS’ CHOICE • A deeply reported, searingly honest portrait of the death penalty in Texas—and what it tells us about crime and punishment in America
“If you’re one of those people who despair that nothing changes, and dream that something can, this is a story of... |  |  Blackhatonomics: An Inside Look at the Economics of Cybercrime
Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus... |
|
 |  |  |  |  Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... |
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 |