|
|
|
|
Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... | | Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | Cybercrime and SocietyCriminology has been rather slow to recognise the importance of cyberspace in changing the nature and scope of offending and victimisation, and a comprehensive introductory textbook on cybercrime and its social implications is long overdue. One of the many strengths of Majid Yar's book is that it avoids 'techy' jargon and unites criminological and... |
|
The Best Damn Cybercrime and Forensics Book PeriodAs is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.
If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the... | | Automated Fingerprint Identification Systems (AFIS), First EditionThere is a world in which every crime is solved in 60 minutes, DNA matches are made “While U Wait,” and staff work on only one case at a time. But it is a fantasy land, an imaginary land; it is not the real world. This book is about the real world of biometric identification technology. It is a fascinating topic. This technology can... | | Trust and Legitimacy in Criminal Justice: European Perspectives
The book explores police legitimacy and crime control, with a focus on the European region. Using comparative case studies, the contributions to this timely volume examine the effects of a transition to democracy on policing, public attitudes towards police legitimacy, and the ways in which perceptions of police legitimacy relate to... |
|
Digital Crime And Forensic Science in Cyberspaceitself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has... | | Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)Moore explains the difficulties in applying traditional Fourth Amendment jurisprudence several of the more common warrantless search doctrines, in order to determine what aspects of traditional search and seizure doctrine apply to crimes involving technology. To amplify his points, he discusses several high technology crimes. Additionally, he... | | Web2Py Manual
I am guilty! After publicly complaining about the existence of too many Python based web frameworks, after praising the merits of Django, Pylons, TurboGears, CherryPy, and web.py, after having used them professionally and taught them in University level courses, I could not resist and created one more: web2py.
Why did I commit such... |
|
Incident Response: Computer Forensics ToolkitYour in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks
Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer... | | The Psychology of the InternetThis timely volume explores the psychological aspects of cyberspace, a virtual world in which people from around the globe are acting and interacting in many new, unusual, and occasionally alarming ways. Drawing on research in the social sciences, communications, business, and other fields, Patricia Wallace examines how the online environment can... | | |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |