Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
I have thought long and hard about this book. This book was not created to make money. It was created to save lives — the lives of first responders and the people they have dedicated their lives to protect, the general public.

What is a first responder? It is a phrase often mentioned in the press but rarely defined.
...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and torture are twin evils that have dominated news headlines - particularly since the horrifying events of 9/11. In this thought-provoking volume, scholars from a diverse range of disciplines examine the complex motivational and situational factors contributing to terrorist acts and state-sponsored torture, and the potential linkage...
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Our aim with this book was to place, under the same roof, two distinct but intertwined aspects of the use of fingerprinting for personal identification and criminal investigation: (1) the aspects associated with the visualization, detection, and recording of friction ridge skin impressions and (2) the issues regarding the identification or...
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.

This...

The Mafia Encyclopedia
The Mafia Encyclopedia

Organized crime is the greatest criminal phenomenon of our time. From Al Capone, who boldly claimed his bootlegging activities were a public service, to John Gotti, the "Teflon don" who died in prison, these criminals have garnered headlines and captured the public imagination with their flamboyant lifestyles and colorful attitudes....

Web Security, Privacy and Commerce, 2nd Edition
Web Security, Privacy and Commerce, 2nd Edition
The World Wide Web has changed our world. More than half the people in the United States now use the Web on a regular basis. We use it to read today's news, to check tomorrow's weather, and to search for events that have happened in the distant past. And increasingly, the Web is the focus of the 21st century...
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
American Bar Association Family Legal Guide
American Bar Association Family Legal Guide
The American Bar Association Family Legal Guide offers the most comprehensive, useful, and authoritative information available on how the law affects individuals at home, at work, and at play. This practical guide will help consumers steer clear of many legal pitfalls and will guide readers to a better understanding of their rights and...
Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications presents both theories and applications of computational intelligence in a clear, precise and highly comprehensive style. The textbook addresses the fundamental aspects of fuzzy sets and logic, neural networks, evolutionary computing and belief networks. The...
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy