Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Fighting Crime Together: The Challenges of Policing and Security Networks
Fighting Crime Together: The Challenges of Policing and Security Networks
Whether they want to or not, police are increasingly having to work with and through many local, national and international partnerships. This edited collection explores the development of policing and security networks. It looks at ways in which police can develop new strategies for integrating the knowledge, capacities and resources of different...
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cresser, NBC News terrorism analyst
...
Adobe Photoshop Forensics
Adobe Photoshop Forensics
Thanks to TV's crime scene investigation shows, forensic technology has entered popular culture. Combining puzzle solving and a dramatic storyline, these shows fascinate audiences as high-tech procedures uncover the truths hidden in seemingly insignificant clues. What many people may not realize is that forensic teams also use items they probably...
The World Heroin Market: Can Supply Be Cut? (Studies in Crime and Public Policy)
The World Heroin Market: Can Supply Be Cut? (Studies in Crime and Public Policy)
Heroin is universally considered the world's most harmful illegal drug. This is due not only to the damaging effects of the drug itself, but also to the spread of AIDS tied to its use. Burgeoning illegal mass consumption in the 1960s and 1970s has given rise to a global market for heroin and other opiates of nearly 16 million users. The production...
Google Maps Hacks
Google Maps Hacks

Want to find every pizza place within a 15-mile radius? Where the dog parks are in a new town? The most central meeting place for your class, club or group of friends? The cheapest gas stations on a day-to-day basis? The location of convicted sex offenders in an area to which you may be considering moving? The applications,...

Intrusion Detection and Prevention
Intrusion Detection and Prevention

In today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,...

Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.

This unique collection details how to
...

Howzzat?
Howzzat?
Sherlock Holmes with his fancy hat, magnifying glass and pipe always fascinated me. I was glued to every clue Perry Mason worked on. I would read with anticipation as Ganesh (Vasanth) reconstructed a crime with a seemingly simple object. The way these celebrated detectives worked was really captivating— piecing clues...
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Victimology
Victimology

Unmasking Women and Crime provides a cohesive view of the theory, history, and current issues having to do with the intersection between women and crime. This fresh perspective from recognized experts brings women out from behind the mask of simplistic stereotyping and examines the nuanced roles and issues of women offenders, women victims,...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy