Home | Amazing | Today | Tags | Publishers | Years | Search 
Encyclopedia of White-Collar & Corporate Crime (Multi-Volume Set)
Encyclopedia of White-Collar & Corporate Crime (Multi-Volume Set)
With more than 500 entries (including up-to-date information on such high profile cases as Martha Stewart and Enron), the Encyclopedia of White-Collar & Corporate Crime gathers history, definitions, examples, investigation, prosecution, assessments, challenges, and projections into one definitive reference work on the topic. The Encyclopedia...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
Numb3rs looks like a winn3r.”
USA Today

The companion to the hit CBS crime series Numb3rs presents the fascinating way mathematics is used to fight real-life crime

Using the popular CBS prime-time TV crime series Numb3rs as a
...
Unsolved Crimes (Criminal Investigations)
Unsolved Crimes (Criminal Investigations)
In "Unsolved Crimes", famous, unresolved cases from the past 120 years are examined to review what police and experts in forensic science did (or failed to do) while trying to resolve each crime. For each case covered, the key theories and suspects are described. Though technology is much improved since the time of Jack the Ripper in...
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
The Autobiography of Malcolm X: As Told to Alex Haley
The Autobiography of Malcolm X: As Told to Alex Haley
Malcolm X's searing memoir belongs on the small shelf of great autobiographies. The reasons are many: the blistering honesty with which he recounts his transformation from a bitter, self-destructive petty criminal into an articulate political activist, the continued relevance of his militant analysis of white racism, and his emphasis on...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Cybercrime and Society
Cybercrime and Society
Criminology has been rather slow to recognise the importance of cyberspace in changing the nature and scope of offending and victimisation, and a comprehensive introductory textbook on cybercrime and its social implications is long overdue. One of the many strengths of Majid Yar's book is that it avoids 'techy' jargon and unites criminological and...
The Maverick and His Machine: Thomas Watson, Sr. and the Making of IBM
The Maverick and His Machine: Thomas Watson, Sr. and the Making of IBM

Praise for THE MAVERICK AND HIS MACHINE

"Like all great biographers, Kevin Maney gives us an engaging story and so much more. His fascinating and definitive book about IBM’s founder is replete with amazing revelations and character lessons that resonate today. Among the gems: how a demanding curmudgeon managed to shape...

Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Advances in Digital Government (Advances in Database Systems)
Advances in Digital Government (Advances in Database Systems)
Book Series: THE KLUWER INTERNATIONAL SERIES ON ADVANCES IN DATABASE SYSTEMS : Volume 26

Advances In Digital Government presents a collection of in-depth articles that addresses a representative cross-section of the matrix of issues involved in implementing digital government systems. These articles constitute a survey of both the technical and...

Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and torture are twin evils that have dominated news headlines - particularly since the horrifying events of 9/11. In this thought-provoking volume, scholars from a diverse range of disciplines examine the complex motivational and situational factors contributing to terrorist acts and state-sponsored torture, and the potential linkage...
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy