Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Understanding Criminology: Current Theoretical Debates (Crime and Justice)
Understanding Criminology: Current Theoretical Debates (Crime and Justice)
"Provides a very clear, easily readable introduction to the wide range of criminological theories.". Anne Rees, University of Portsmouth, UK
  • What does contemporary criminological theory look like? .
  • What impact, if any, does it have on policy?
The new edition of this
...
Restoring Justice, Fifth Edition: An Introduction to Restorative Justice
Restoring Justice, Fifth Edition: An Introduction to Restorative Justice

Restoring Justice: An Introduction to Restorative Justice, Fifth Edition, offers a clear and convincing explanation of restorative justice, a movement within criminal justice with growing worldwide influence. It explores the broad appeal of this new vision and offers a brief history of its development. The book presents a theoretical...

Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Stealing the Network: How to Own a Continent
Stealing the Network: How to Own a Continent
This book outlines a fictional plot to "own the box" by compromising an entire continent's network infrastructure. It combines a set of stories with real technology to show readers the danger that lurks in the shadows of the information security industry.

The first book in this series ...

Unsolved Crimes (Criminal Investigations)
Unsolved Crimes (Criminal Investigations)
In "Unsolved Crimes", famous, unresolved cases from the past 120 years are examined to review what police and experts in forensic science did (or failed to do) while trying to resolve each crime. For each case covered, the key theories and suspects are described. Though technology is much improved since the time of Jack the Ripper in...
Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Border Contraband: A History of Smuggling across the Rio Grande (Inter-America)
Border Contraband: A History of Smuggling across the Rio Grande (Inter-America)

Winner, Jim Parish Award for Documentation and Publication of Local and Regional History, Webb County Heritage Foundation, 2015

Present-day smuggling across the U.S.-Mexico border is a professional, often violent, criminal activity. However, it is only the latest chapter in a history of illicit business dealings that...

Advances in Digital Government (Advances in Database Systems)
Advances in Digital Government (Advances in Database Systems)
Book Series: THE KLUWER INTERNATIONAL SERIES ON ADVANCES IN DATABASE SYSTEMS : Volume 26

Advances In Digital Government presents a collection of in-depth articles that addresses a representative cross-section of the matrix of issues involved in implementing digital government systems. These articles constitute a survey of both the technical and...

Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Safety-Critical Systems: Problems, Process and Practice: Proceedings of the Seventeenth Safety-Critical Systems Symposium Brighton, UK, 3 - 5 February 2009
Safety-Critical Systems: Problems, Process and Practice: Proceedings of the Seventeenth Safety-Critical Systems Symposium Brighton, UK, 3 - 5 February 2009
The Safety-critical Systems Symposium (SSS), held each February for seventeen consecutive years, offers a full-day tutorial followed by two days of presentations of papers. This book of Proceedings contains all the papers presented at SSS’09.

The first paper accompanies the tutorial, which addresses one of the
...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy