Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Yakuza: Japan's Criminal Underworld, Expanded Edition
Yakuza: Japan's Criminal Underworld, Expanded Edition
Known for their striking full-body tattoos and severed fingertips, Japan's gangsters comprise a criminal class eighty thousand strong—more than four times the size of the American Mafia. Despite their criminal nature, the yakuza are accepted by fellow Japanese to a degree guaranteed to shock most Westerners. Here is the first book...
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

And Every Word Is True: Newfound evidence reveals Truman Capote's
And Every Word Is True: Newfound evidence reveals Truman Capote's
Truman Capote’s bestselling book “In Cold Blood” has captivated worldwide audiences for over fifty years. It is a gripping story about the consequences of a trivial robbery gone terribly wrong in a remote village of western Kansas.But what if robbery was not the motive at all, but something more sinister? And why would the...
Criminology For Dummies
Criminology For Dummies

Your thorough guide to comprehending and combating crime

Are you fascinated by criminology, forensics, and detective work? This you-are-there guide takes you deep into the world of crime, giving you a better understanding of the dark recesses of the criminal mind and how law enforcement officials investigate crime. You'll gain real-world...

Mastering Java Machine Learning: Mastering and implementing advanced techniques in machine learning
Mastering Java Machine Learning: Mastering and implementing advanced techniques in machine learning

Become an advanced practitioner with this progressive set of master classes on application-oriented machine learning

About This Book

  • Comprehensive coverage of key topics in machine learning with an emphasis on both the theoretical and practical aspects
  • More than 15 open source Java tools...
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
Numb3rs looks like a winn3r.”
USA Today

The companion to the hit CBS crime series Numb3rs presents the fascinating way mathematics is used to fight real-life crime

Using the popular CBS prime-time TV crime series Numb3rs as a
...
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest...
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Boxing and the Mob: The Notorious History of the Sweet Science
Boxing and the Mob: The Notorious History of the Sweet Science
More than any other sport, boxing has a history of being easy to rig. There are only two athletes and one or both may be induced to accept a bribe; if not the fighters, then the judges or referee might be swayed. In such inviting circumstances, the mob moved into boxing in the 1930s and profited by corrupting a sport ripe for...
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Molecular Forensics
Molecular Forensics

Molecular Forensics offers a comprehensive coverage of the increasingly important role that molecular analysis plays within forensic science. Starting with a broad introduction of modern forensic molecular technologies, the text covers key issues from the initial scenes of crime sampling to the use of evidential material in the...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy