Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. 

This book helps you understand forensics in relation to Oracle Database, and the tools and
...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Computer Crime, Investigation, and the Law
Computer Crime, Investigation, and the Law

One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Drug Use and Abuse: A Comprehensive Introduction
Drug Use and Abuse: A Comprehensive Introduction

Packed with the latest data and research, the powerful new DRUG USE AND ABUSE: A COMPREHENSIVE INTRODUCTION, 8e delivers a thorough, interdisciplinary survey of all aspects of drug and alcohol abuse. The text draws from the many disciplines of history, law, pharmacology, political science, social work, counseling, psychology, sociology, and...

Robert B. Parker's Kickback (Spenser)
Robert B. Parker's Kickback (Spenser)

PI Spenser, knight-errant of the Back Bay, returns in this stellar New York Times–bestselling addition to the iconic series from author Ace Atkins.
 
What started out as a joke landed seventeen-year-old Dillon Yates in a lockdown juvenile facility in Boston Harbor. When he set up a prank Twitter
...

The Encyclopedia of Serial Killers
The Encyclopedia of Serial Killers

"The Encyclopaedia of Serial Killers, Second Edition" provides accurate information on hundreds of serial murder cases - from early history to the present. Written in a non-sensational manner, this authoritative encyclopaedia debunks many of the myths surrounding this most notorious of criminal activities. New major serial killers...

Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the...
Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective
Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective

Comprehensive and user friendly, this book synthesizes the growing literature on symptom feigning in cognitive testing and translates it into evidence-based recommendations for clinical and forensic practice. A wide range of cognitive effort assessment techniques and strategies are critically...

The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)
The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)

The Handbook of Homicide presents a series of original essays by renowned authors from around the world, reflecting the latest scholarship on the nature, causes, and patterns of homicide, as well as policies and practices for its investigation and prevention.

  • Includes comprehensive coverage of the complex phenomenon...
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy