Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. 

This book helps you understand forensics in relation to Oracle Database, and the tools and
...
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community...
Biased: Uncovering the Hidden Prejudice That Shapes What We See, Think, and Do
Biased: Uncovering the Hidden Prejudice That Shapes What We See, Think, and Do
"A fascinating new book... [Dr. Jennifer Eberhardt is] a genius."—Trevor Noah, The Daily Show with Trevor Noah

"Poignant....important and illuminating."—The New York Times Book Review

"Groundbreaking."—Bryan Stevenson, New York Times
...
The Journalist's Guide to Media Law: A handbook for communicators in a digital world
The Journalist's Guide to Media Law: A handbook for communicators in a digital world
We are all journalists and publishers now: at the touch of a button we can send our words, sounds and images out to the world. No matter whether you're a traditional journalist, a blogger, a public relations practitioner or a social media editor, everything you publish or broadcast is subject to the law. But which law?

...
The Sexual Economy of War: Discipline and Desire in the U.S. Army (Battlegrounds: Cornell Studies in Military History)
The Sexual Economy of War: Discipline and Desire in the U.S. Army (Battlegrounds: Cornell Studies in Military History)

In The Sexual Economy of War, Andrew Byers argues that in the early twentieth century, concerns about unregulated sexuality affected every aspect of how the US Army conducted military operations. Far from being an exercise marginal to the institution and its scope of operations, governing sexuality was, in fact, integral to...

Boxing and the Mob: The Notorious History of the Sweet Science
Boxing and the Mob: The Notorious History of the Sweet Science
More than any other sport, boxing has a history of being easy to rig. There are only two athletes and one or both may be induced to accept a bribe; if not the fighters, then the judges or referee might be swayed. In such inviting circumstances, the mob moved into boxing in the 1930s and profited by corrupting a sport ripe for...
Theories of Crime Through Popular Culture
Theories of Crime Through Popular Culture

This textbook brings criminology theories to life through a wide range of popular works in film, television and video games including 13 Reasons Why, Game of Thrones, The Office, and Super Mario Bros, from a variety of contributors. It serves as an engaging and creative...

Digital Robbery: ATM Hacking and Implications (SpringerBriefs in Cybersecurity)
Digital Robbery: ATM Hacking and Implications (SpringerBriefs in Cybersecurity)
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory...
Let the Lord Sort Them: The Rise and Fall of the Death Penalty
Let the Lord Sort Them: The Rise and Fall of the Death Penalty
NEW YORK TIMES EDITORS’ CHOICE • A deeply reported, searingly honest portrait of the death penalty in Texas—and what it tells us about crime and punishment in America

“If you’re one of those people who despair that nothing changes, and dream that something can, this is a story of
...
The SAGE Encyclopedia of Trans Studies
The SAGE Encyclopedia of Trans Studies
Transgender studies, broadly defined, has become increasingly prominent as a field of study over the past several decades, particularly in the last ten years. The experiences and rights of trans people have also increasingly become the subject of news coverage, such as the ability of trans people to access restrooms, their...
The Science of Hate: How prejudice becomes hate and what we can do to stop it
The Science of Hate: How prejudice becomes hate and what we can do to stop it

Why do people commit hate crimes? A world-leading criminologist explores the tipping point between prejudice and hate crime, analysing human behaviour across the globe and throughout history in this vital book.

'Utterly brilliant . . . powerful . . . From personal histories to broader social
...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy