Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
Criminal Psychology and Forensic Technology: A Collaborative Approach to Effective Profiling
Criminal Psychology and Forensic Technology: A Collaborative Approach to Effective Profiling
Offender profiling has been developing slowly as a possible investigative tool since 1841 and the publication of Edgar Allen Poe's The Murder in the Rue Morgue. In this book, detective C. Auguste Dupin demonstrates the ability to follow the thought patterns of a companion while they stroll through Paris for 15 minutes without speaking a word. Today...
The SAGE Encyclopedia of Trans Studies
The SAGE Encyclopedia of Trans Studies
Transgender studies, broadly defined, has become increasingly prominent as a field of study over the past several decades, particularly in the last ten years. The experiences and rights of trans people have also increasingly become the subject of news coverage, such as the ability of trans people to access restrooms, their...
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types,...

The Science of Hate: How prejudice becomes hate and what we can do to stop it
The Science of Hate: How prejudice becomes hate and what we can do to stop it

Why do people commit hate crimes? A world-leading criminologist explores the tipping point between prejudice and hate crime, analysing human behaviour across the globe and throughout history in this vital book.

'Utterly brilliant . . . powerful . . . From personal histories to broader social
...

Identity Theft Handbook: Detection, Prevention, and Security
Identity Theft Handbook: Detection, Prevention, and Security
The magnitude of the identity theft and fraud problem is enormous. Identity fraud was identified as one of the top priorities of the Department of Justice, just prior to the terrorist attacks of 9/11. Naturally, everyone’s priorities changed after 9/11. The impact of identity theft and identity fraud is reaching a proportion and a level of...
Introduction to Forensic DNA Evidence for Criminal Justice Professionals
Introduction to Forensic DNA Evidence for Criminal Justice Professionals

The use of DNA profiling in forensic cases has been considered the most innovative technique in forensic science since fingerprinting, yet for those with limited scientific knowledge, understanding DNA enough to utilize it properly can be a daunting task. Introduction to Forensic DNA Evidence for Criminal Justice Professionals is...

Crime and Justice in America: An Introduction to Criminal Justice
Crime and Justice in America: An Introduction to Criminal Justice

Crime and Justice in America offers a concise, affordable, and reader friendly full-color introduction to the criminal justice system. It explores the system in four sections: the criminal justice system as social control, law enforcement as social control, the law as social control, and corrections as social control. Widely...

Computer Crime: A Crimefighter's Handbook (Computer Security)
Computer Crime: A Crimefighter's Handbook (Computer Security)

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...

Montreal's Irish Mafia: The True Story of the Infamous West End Gang
Montreal's Irish Mafia: The True Story of the Infamous West End Gang

Their names resonate with organized crime in Montreal: the Matticks, MacAllisters, Johnstons and Griffins, and Peter Dunie Ryan. They are the Irish equivalent of the infamous Rizzuto and Cotroni families, and the "Mom" Bouchers and Walter Stadnicks of the Hells Angels. Award-winning producer, journalist and author D’Arcy...

Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy