Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Robbery: ATM Hacking and Implications (SpringerBriefs in Cybersecurity)
Digital Robbery: ATM Hacking and Implications (SpringerBriefs in Cybersecurity)
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory...
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
WRITTEN BY A LAW ENFORCEMENT PROFESSIONAL FOR OTHER LAW ENFORCEMENT PERSONNEL IN THE TRENCHES This book examines the workings of organized criminals and criminal groups that transcend national boundaries. Discussions include methods used by criminal groups to internationally launder money; law enforcement efforts to counteract such schemes; and...
Database Design for Smarties: Using UML for Data Modeling
Database Design for Smarties: Using UML for Data Modeling
If you want to see how your next database project can profit from object-oriented design, check out Database Design for Smarties, a lively and intelligent guide to using objects in databases.

The book begins with a tour of some underlying factors in modeling databases. Here, the author distinguishes between the external,...

Warranty Fraud Management: Reducing Fraud and Other Excess Costs in Warranty and Service Operations (Wiley and SAS Business Series)
Warranty Fraud Management: Reducing Fraud and Other Excess Costs in Warranty and Service Operations (Wiley and SAS Business Series)

Cut warranty costs by reducing fraud with transparent processes and balanced control

Warranty Fraud Management provides a clear, practical framework for reducing fraudulent warranty claims and other excess costs in warranty and service operations. Packed with actionable guidelines and detailed information, this book...

Android Programming: The Big Nerd Ranch Guide (Big Nerd Ranch Guides)
Android Programming: The Big Nerd Ranch Guide (Big Nerd Ranch Guides)

Android Programming: The Big Nerd Ranch Guide: is an introductory Android book for programmers with Java experience. Based on Big Nerd Ranch’s popular Android Bootcamp course, this guide will lead you through the wilderness using hands-on example apps combined with clear explanations of key concepts and APIs. This book focuses on...

AIDS/Hiv (Information Plus Reference Series)
AIDS/Hiv (Information Plus Reference Series)
AIDS/HIV is part of the Information Plus Reference Series. The purpose of each volume of the series is to present the latest facts on a topic of pressing concern in modern American life. These topics include today’s most controversial and most studied social issues: abortion, capital punishment, care for the elderly,...
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
This book examines the role of deceptive tactics in the criminal victimization process, showing how various forms of manipulative aggression can help disguise dangerous advances. The author approaches crime victimization as the final stage in a purposeful, predictable, dynamic, and progressively dangerous process involving...
Bloodstain Pattern Analysis with an Introduction to Crime Scene Reconstruction, Third Edition (Practical Aspects of Criminal and Forensic Investigations)
Bloodstain Pattern Analysis with an Introduction to Crime Scene Reconstruction, Third Edition (Practical Aspects of Criminal and Forensic Investigations)
The goal of forensics and crime scene reconstruction is simply to seek the truth. The analyst has no other agenda. In pursuing this end, we revisit what we hope is a not too distant past and attempt to recreate the events that unfolded. This task is anything but simple and the tools employed are all of the forensic disciplines.

Each area
...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy