Home | Amazing | Today | Tags | Publishers | Years | Search 
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

The Theory of Gambling and Statistical Logic, Second Edition
The Theory of Gambling and Statistical Logic, Second Edition

Early in his rise to enlightenment, man invented a concept that has since been variously viewed as a vice, a crime, a business, a pleasure, a type of magic, a disease, a folly, a weakness, a form of sexual substitution, an expression of the human instinct. He invented gambling.

Recent advances in the field, particularly...

World Criminal Justice Systems, Eighth Edition: A Comparative Survey
World Criminal Justice Systems, Eighth Edition: A Comparative Survey

This comparative text provides an understanding of major world criminal justice systems by discussing and comparing the systems of six of the world's countries: England, France, Russia, China, Japan, and a new chapter on South Africa -- each representative of a different type of legal system. An additional chapter on Islamic law uses...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Restoring Justice, Fifth Edition: An Introduction to Restorative Justice
Restoring Justice, Fifth Edition: An Introduction to Restorative Justice

Restoring Justice: An Introduction to Restorative Justice, Fifth Edition, offers a clear and convincing explanation of restorative justice, a movement within criminal justice with growing worldwide influence. It explores the broad appeal of this new vision and offers a brief history of its development. The book presents a theoretical...

AIDS/Hiv (Information Plus Reference Series)
AIDS/Hiv (Information Plus Reference Series)
AIDS/HIV is part of the Information Plus Reference Series. The purpose of each volume of the series is to present the latest facts on a topic of pressing concern in modern American life. These topics include today’s most controversial and most studied social issues: abortion, capital punishment, care for the elderly,...
Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)
Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)

Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book...

Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy