|
|
|
|
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the
smooth operation of communication and computing solutions becomes vital. However,
recurring events such as virus and worm attacks and the success of criminal attackers illustrate
the weaknesses in current information technologies and the... | | | | The SAGE Encyclopedia of Trans Studies
Transgender studies, broadly defined, has become increasingly prominent as a field of study over the past several decades, particularly in the last ten years. The experiences and rights of trans people have also increasingly become the subject of news coverage, such as the ability of trans people to access restrooms, their... |
|
| | | | Identity Theft Handbook: Detection, Prevention, and SecurityThe magnitude of the identity theft and fraud problem is enormous. Identity fraud was identified as one of the top priorities of the Department of Justice, just prior to the terrorist attacks of 9/11. Naturally, everyone’s priorities changed after 9/11. The impact of identity theft and identity fraud is reaching a proportion and a level of... |
|
Introduction to Forensic DNA Evidence for Criminal Justice Professionals
The use of DNA profiling in forensic cases has been considered the most innovative technique in forensic science since fingerprinting, yet for those with limited scientific knowledge, understanding DNA enough to utilize it properly can be a daunting task. Introduction to Forensic DNA Evidence for Criminal Justice Professionals is... | | Crime and Justice in America: An Introduction to Criminal Justice
Crime and Justice in America offers a concise, affordable, and reader friendly full-color introduction to the criminal justice system. It explores the system in four sections: the criminal justice system as social control, law enforcement as social control, the law as social control, and corrections as social control. Widely... | | Computer Crime: A Crimefighter's Handbook (Computer Security)
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up... |
|
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |