|
|
|
|
Investigative Data Mining for Security and Criminal Detection, First EditionInvestigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest... | | Boxing and the Mob: The Notorious History of the Sweet Science
More than any other sport, boxing has a history of being easy to rig. There are only two athletes and one or both may be induced to accept a bribe; if not the fighters, then the judges or referee might be swayed. In such inviting circumstances, the mob moved into boxing in the 1930s and profited by corrupting a sport ripe for... | | |
|
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.
Practical... | | The Palgrave Handbook of Philosophy and Public Policy
This book brings together a large and diverse collection of philosophical papers addressing a wide variety of public policy issues. Topics covered range from long-standing subjects of debate such as abortion, punishment, and freedom of expression, to more recent controversies such as those over gene editing, military drones, and statues ... | | Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... |
|
|
Foundations of Computer SecurityAnyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its... | | Trust and Legitimacy in Criminal Justice: European Perspectives
The book explores police legitimacy and crime control, with a focus on the European region. Using comparative case studies, the contributions to this timely volume examine the effects of a transition to democracy on policing, public attitudes towards police legitimacy, and the ways in which perceptions of police legitimacy relate to... | | Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)Moore explains the difficulties in applying traditional Fourth Amendment jurisprudence several of the more common warrantless search doctrines, in order to determine what aspects of traditional search and seizure doctrine apply to crimes involving technology. To amplify his points, he discusses several high technology crimes. Additionally, he... |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |