Home | Amazing | Today | Tags | Publishers | Years | Search 
My Time Will Come: A Memoir of Crime, Punishment, Hope, and Redemption
My Time Will Come: A Memoir of Crime, Punishment, Hope, and Redemption
The inspiring story of activist and poet Ian Manuel, who at the age of fourteen was sentenced to life in prison. He survived eighteen years in solitary confinement—through his own determination and dedication to art—until he was freed as part of an incredible crusade by the Equal Justice Initiative.
 
...
Let the Lord Sort Them: The Rise and Fall of the Death Penalty
Let the Lord Sort Them: The Rise and Fall of the Death Penalty
NEW YORK TIMES EDITORS’ CHOICE • A deeply reported, searingly honest portrait of the death penalty in Texas—and what it tells us about crime and punishment in America

“If you’re one of those people who despair that nothing changes, and dream that something can, this is a story of
...
Intrusion Detection and Prevention
Intrusion Detection and Prevention

In today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,...

File System Forensic Analysis
File System Forensic Analysis
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier...
Google Maps Hacks
Google Maps Hacks

Want to find every pizza place within a 15-mile radius? Where the dog parks are in a new town? The most central meeting place for your class, club or group of friends? The cheapest gas stations on a day-to-day basis? The location of convicted sex offenders in an area to which you may be considering moving? The applications,...

Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
The Addiction Counselor's Desk Reference
The Addiction Counselor's Desk Reference
We prepared this book to provide addiction counselors—and others whose work
involves them with addicted people—with useful, easily accessible, up-to-date
information.

Since addicted clients challenge even the most highly skilled counselor, every
available skill and resource helps. How does one help a client who
...
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

Encyclopedia of Genocide (2 Volumes)
Encyclopedia of Genocide (2 Volumes)

The Encyclopedia is designed in an innovative structure that combines four types of entries:

  • Traditional Entries, or basic encyclopedic summaries of the knowledge in a typical area or field of study;
  • Feature Entries, which include...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy