This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...
NEW YORK TIMES BESTSELLER • The wise, moving new novel from Danielle Steel, whose many bestselling tales have made her one of America’s favorite authorsTaking chances is part of life, but when you bet your future against the odds, it’s a high-risk game. Kate Madison’s stylish resale shop has been a...
Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.
Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...
Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie
Imagine how different your life would be if you could tell whether someone was lying or telling you the truth....
Comprehensive and user friendly, this book synthesizes the growing literature on symptom feigning in cognitive testing and translates it into evidence-based recommendations for clinical and forensic practice. A wide range of cognitive effort assessment techniques and strategies are critically...
In this revised and expanded edition, leading forensic scientist John Trestrail offers a pioneering survey of all that is known about the use of poison as a weapon in murder. Topics range from the use of poisons in history and literature to convicting the poisoner in court, and include a review of the different types of poisons, techniques...
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book...
The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...
As little as two decades ago, deliberately injecting botulinum toxin into patients would have seemed foolhardy at best and criminal at worst. The increased clinical use of botulinum toxins has expanded the body of knowledge available on the structure and function of these proteins. This knowledge can be applied to topics as varied as...
Investigate crimes involving cryptocurrencies and other blockchain technologies
Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...
The Handbook of Homicide presents a series of original essays by renowned authors from around the world, reflecting the latest scholarship on the nature, causes, and patterns of homicide, as well as policies and practices for its investigation and prevention.
Includes comprehensive coverage of the complex phenomenon...