|
|
|
|
Principles of Cybercrime
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every... | | Portrait of a Killer: Jack the Ripper -- Case Closed
The number-one New York Times-bestselling novelist Patricia Cornwell is known the world over for her brilliant storytelling, the courage of her characters, and the state-of-the-art forensic methods they employ.
In this headline-making new work of nonfiction, Cornwell turns her trademark skills for meticulous research... | | Theories of Crime Through Popular Culture
This textbook brings criminology theories to life through a wide range of popular works in film, television and video games including 13 Reasons Why, Game of Thrones, The Office, and Super Mario Bros, from a variety of contributors. It serves as an engaging and creative... |
|
Fighting Computer Crime: A New Framework for Protecting Information
Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during... | | Digital Evidence and Computer Crime, Second EditionDigital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an... | | Perimeter SecurityPerimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource... |
|
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and... | | Let the Lord Sort Them: The Rise and Fall of the Death Penalty
NEW YORK TIMES EDITORS’ CHOICE • A deeply reported, searingly honest portrait of the death penalty in Texas—and what it tells us about crime and punishment in America
“If you’re one of those people who despair that nothing changes, and dream that something can, this is a story of... | | Stealing the Network: How to Own the BoxStealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real.While none of these specific events have happened, there is no reason why they could not.You could argue it provides a roadmap for criminal hackers, but I say it does something... |
|
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 |