Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Medieval City (Greenwood Guides to Historic Events of the Medieval World)
The Medieval City (Greenwood Guides to Historic Events of the Medieval World)
After a long decline in urban life following the fall of the Roman Empire, towns became centers of trade and of liberty during the medieval period. Here, the author describes how, as Europe stabilized after centuries of strife, commerce and the commercial class grew, and urban areas became an important source of revenue into royal coffers. Towns...
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...

Crime and Punishment: Essential Primary Sources
Crime and Punishment: Essential Primary Sources
Crime, and the issues that relate to it, arouse compelling curiosity and fervent debate. In the human psyche, crimes and their underlying motives often capture equal measures of fascination and revulsion. In the media, criminals are both condemned and granted celebrity. Accordingly, the readings and resources offered in Crime and Punishment:...
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Combating Piracy: Intellectual Property Theft and Fraud
Combating Piracy: Intellectual Property Theft and Fraud
Manifestations of fraud in the early twenty-first century are showing signs of innovations and adaptation in response to shifting opportunities. This book reports on new analyses of intellectual property theft as its most recent expression. Fraud and piracy of products and ideas have become common as the opportunities to commit them expand, and...
Practical Aspects of Interview and Interrogation-Soft Cover
Practical Aspects of Interview and Interrogation-Soft Cover
What makes a person confess to a crime he did not commit? Was he coerced? Is he trying to protect someone else? Interrogation has come under attack as opponents focus on false confessions. However, most cases are still resolved by confession, not forensic evidence. Among the new topics covered in the Second Edition of this bestselling book,...
Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators
Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators

The First Practical Guide to the Use of Photoshop in Forensics Investigations

This timely book is the first to take the forensic use of digital imaging out of the classroom and into the real world for law enforcement, legal, and other forensics professionals. How do you show the exact position or...

Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Portrait of a Killer: Jack the Ripper -- Case Closed
Portrait of a Killer: Jack the Ripper -- Case Closed

The number-one New York Times-bestselling novelist Patricia Cornwell is known the world over for her brilliant storytelling, the courage of her characters, and the state-of-the-art forensic methods they employ.

In this headline-making new work of nonfiction, Cornwell turns her trademark skills for meticulous research
...

Theories of Crime Through Popular Culture
Theories of Crime Through Popular Culture

This textbook brings criminology theories to life through a wide range of popular works in film, television and video games including 13 Reasons Why, Game of Thrones, The Office, and Super Mario Bros, from a variety of contributors. It serves as an engaging and creative...

Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy