Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)
Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)

Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book...

Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Smuggling: Contraband and Corruption in World History (Exploring World History)
Smuggling: Contraband and Corruption in World History (Exploring World History)

Exploring the history of smuggling around the world, Alan L. Karras traces all aspects of this pervasive and enduring crime. Through a compelling set of cases drawn from a rich array of historical and contemporary sources, Karras shows how smuggling of every conceivable good has flourished in every place, at every time. The author also sets...

The Fascination with Violence in Contemporary Society: When Crime is Sublime (Palgrave Studies in Crime, Media and Culture)
The Fascination with Violence in Contemporary Society: When Crime is Sublime (Palgrave Studies in Crime, Media and Culture)
This book directly explores the question of why contemporary society is so fascinated with violence and crime. The Fascination with Violence in Contemporary Society posits that the phenomenon is, in part, because we have all become consumers of the sublime: an intense and strongly ambiguous emotion which is increasingly...
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer forensics and intrusion forensics are rapidly becoming
mainstream activities in an increasingly online society due to the
ubiquity of computers and computer networks. We make daily use of
computers either for communication or for personal or work transactions.
From our desktops and laptops we access Web servers, e-mail
...
Digital Forensics: Digital Evidence in Criminal Investigations
Digital Forensics: Digital Evidence in Criminal Investigations

The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific...

Advanced Crime Scene Photography
Advanced Crime Scene Photography

Advanced Crime Scene Photography developed over time and out of my experiences as a crime scene investigator with a large metropolitan police department. Like any major city, violent crime is prevalent, offering numerous opportunities to utilize the different skills and techniques learned and evolved through numerous schools, scene...

China's Drug Practices and Policies: Regulating Controlled Substances in a Global Context
China's Drug Practices and Policies: Regulating Controlled Substances in a Global Context

In the context of global efforts to control the production, distribution, and use of narcotic drugs, China's treatment of the problem provides an important means of understanding the social, political, and economic limits of national and international policies to regulate drug practices. In the nineteenth and early twentieth centuries, China was...

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Forensic Science: An Illustrated Dictionary
Forensic Science: An Illustrated Dictionary
The text is deserving of inclusion in the library of a crime laboratory, if not in the personal library of lab personnel.
- Scientific Sleuthing Review, Summer 2004

This volume introduces the laboratory terms that are crucial to the interpretation and understanding of laboratory report findings. The definitions and accompanying...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy