Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Advanced Automotive Fault Diagnosis, Second Edition
Advanced Automotive Fault Diagnosis, Second Edition
The aspect I still enjoy most about working on vehicles is being able to diagnose a fault that has beaten others! This skill takes a few years to develop but it is worth the effort. Diagnostic work is much like that of a detective solving a difficult crime, all the clues are usually there – if you know where to look. I think it was Sherlock...
Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

Contrast Data Mining: Concepts, Algorithms, and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Contrast Data Mining: Concepts, Algorithms, and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

A Fruitful Field for Researching Data Mining Methodology and for Solving Real-Life Problems
Contrast Data Mining: Concepts, Algorithms, and Applications collects recent results from this specialized area of data mining that have previously been scattered in the literature, making them more accessible to
...

Governing Immigration Through Crime: A Reader
Governing Immigration Through Crime: A Reader
In the United States, immigration is generally seen as a law and order issue. Amidst increasing anti-immigrant sentiment, unauthorized migrants have been cast as lawbreakers. Governing Immigration Through Crime offers a comprehensive and accessible introduction to the use of crime and punishment to manage undocumented immigrants....
Computer Forensics: A Pocket Guide
Computer Forensics: A Pocket Guide

Computer forensics has become an essential tool in the identification of misuse and abuse of systems. Whilst widely utilised within law enforcement, the rate of adoption by organisations has been somewhat slower, with many organisations focusing upon the traditional security countermeasures to prevent an attack from occurring in the first...

Cities Ranked and Rated: More than 400 Metropolitan Areas Evaluated in the U.S. and Canada
Cities Ranked and Rated: More than 400 Metropolitan Areas Evaluated in the U.S. and Canada

Cities Ranked & Rated: Your Guide to the Best Places to Live in the U.S. & Canada provides timely facts and unbiased information on over 400 U.S. and 30 Canadian cities in an easy-to-access format. Whether you're mulling over the idea of relocating, trying to decide where to start out, or just curious about how your...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy