 |
|
 Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new ... |  |  Computer Security Fundamentals (2nd Edition)
It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.
The real question is who is this book for. This book is... |  |  Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... |
|
 The History of Information Security: A Comprehensive Handbook
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
... |  |  The Theory of Gambling and Statistical Logic, Second Edition
Early in his rise to enlightenment, man invented a concept that has since been variously viewed as a vice, a crime, a business, a pleasure, a type of magic, a disease, a folly, a weakness, a form of sexual substitution, an expression of the human instinct. He invented gambling.
Recent advances in the field, particularly... |  |  World Criminal Justice Systems, Eighth Edition: A Comparative Survey
This comparative text provides an understanding of major world criminal justice systems by discussing and comparing the systems of six of the world's countries: England, France, Russia, China, Japan, and a new chapter on South Africa -- each representative of a different type of legal system. An additional chapter on Islamic law uses... |
|
 Scene of the Cybercrime, Second Edition
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one... |  |  Restoring Justice, Fifth Edition: An Introduction to Restorative Justice
Restoring Justice: An Introduction to Restorative Justice, Fifth Edition, offers a clear and convincing explanation of restorative justice, a movement within criminal justice with growing worldwide influence. It explores the broad appeal of this new vision and offers a brief history of its development. The book presents a theoretical... |  |  AIDS/Hiv (Information Plus Reference Series)
AIDS/HIV is part of the Information Plus Reference
Series. The purpose of each volume of the series is to
present the latest facts on a topic of pressing concern in
modern American life. These topics include today’s most
controversial and most studied social issues: abortion,
capital punishment, care for the elderly,... |
|
 |  |  Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary
form as early as the 1960’s, AR is only now becoming truly practical. Recent
advances in mobile processing, coupled with an explosion in digital storage capacity,
ubiquity of wireless broadband connections, mass adoption of smart phones, and... |  |  |
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |