Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest...
Boxing and the Mob: The Notorious History of the Sweet Science
Boxing and the Mob: The Notorious History of the Sweet Science
More than any other sport, boxing has a history of being easy to rig. There are only two athletes and one or both may be induced to accept a bribe; if not the fighters, then the judges or referee might be swayed. In such inviting circumstances, the mob moved into boxing in the 1930s and profited by corrupting a sport ripe for...
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

The Palgrave Handbook of Philosophy and Public Policy
The Palgrave Handbook of Philosophy and Public Policy
This book brings together a large and diverse collection of philosophical papers addressing a wide variety of public policy issues. Topics covered range from long-standing subjects of debate such as abortion, punishment, and freedom of expression, to more recent controversies such as those over gene editing, military drones, and statues...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Cybercrime and Society
Cybercrime and Society
Criminology has been rather slow to recognise the importance of cyberspace in changing the nature and scope of offending and victimisation, and a comprehensive introductory textbook on cybercrime and its social implications is long overdue. One of the many strengths of Majid Yar's book is that it avoids 'techy' jargon and unites criminological and...
Knowledge Management Systems: Value Shop Creation
Knowledge Management Systems: Value Shop Creation
was the value chain developed by Porter (1985). Insights emerged, however, that many organizations have no inbound or outbound logistics of importance, they don’t produce goods in a sequential way and they don’t make money only at the end of their value creation. Therefore, two alternative value configurations have been identified:...
The Maverick and His Machine: Thomas Watson, Sr. and the Making of IBM
The Maverick and His Machine: Thomas Watson, Sr. and the Making of IBM

Praise for THE MAVERICK AND HIS MACHINE

"Like all great biographers, Kevin Maney gives us an engaging story and so much more. His fascinating and definitive book about IBM’s founder is replete with amazing revelations and character lessons that resonate today. Among the gems: how a demanding curmudgeon managed to shape...

Foundations of Computer Security
Foundations of Computer Security
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its...
Trust and Legitimacy in Criminal Justice: European Perspectives
Trust and Legitimacy in Criminal Justice: European Perspectives

The book explores police legitimacy and crime control, with a focus on the European region. Using comparative case studies, the contributions to this timely volume examine the effects of a transition to democracy on policing, public attitudes towards police legitimacy, and the ways in which perceptions of police legitimacy relate to...

Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)
Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)
Moore explains the difficulties in applying traditional Fourth Amendment jurisprudence several of the more common warrantless search doctrines, in order to determine what aspects of traditional search and seizure doctrine apply to crimes involving technology. To amplify his points, he discusses several high technology crimes. Additionally, he...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy