Home | Amazing | Today | Tags | Publishers | Years | Search 
The Autobiography of Malcolm X: As Told to Alex Haley
The Autobiography of Malcolm X: As Told to Alex Haley
Malcolm X's searing memoir belongs on the small shelf of great autobiographies. The reasons are many: the blistering honesty with which he recounts his transformation from a bitter, self-destructive petty criminal into an articulate political activist, the continued relevance of his militant analysis of white racism, and his emphasis on...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Cybercrime and Society
Cybercrime and Society
Criminology has been rather slow to recognise the importance of cyberspace in changing the nature and scope of offending and victimisation, and a comprehensive introductory textbook on cybercrime and its social implications is long overdue. One of the many strengths of Majid Yar's book is that it avoids 'techy' jargon and unites criminological and...
The Maverick and His Machine: Thomas Watson, Sr. and the Making of IBM
The Maverick and His Machine: Thomas Watson, Sr. and the Making of IBM

Praise for THE MAVERICK AND HIS MACHINE

"Like all great biographers, Kevin Maney gives us an engaging story and so much more. His fascinating and definitive book about IBM’s founder is replete with amazing revelations and character lessons that resonate today. Among the gems: how a demanding curmudgeon managed to shape...

Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Dictionary of DNA and Genome Technology
Dictionary of DNA and Genome Technology
DNA technology has a vital role in diverse fields such as criminal investigation and gene therapy – dynamic areas involving many specialized terms and techniques. This unique dictionary offers current, detailed, accessible information to lecturers, researchers, students and technicians throughout the biomedical sciences.
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

Virtualpolitik: An Electronic History of Government Media-Making in a Time of War, Scandal, Disaster, Miscommunication, and Mistakes
Virtualpolitik: An Electronic History of Government Media-Making in a Time of War, Scandal, Disaster, Miscommunication, and Mistakes
Today government agencies not only have official Web sites but also sponsor moderated chats, blogs, digital video clips, online tutorials, videogames, and virtual tours of national landmarks. Sophisticated online marketing campaigns target citizens with messages from the government—even as officials make news with digital gaffes involving...
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure—recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager’s Guide to Disasters:...

Understanding Criminal Investigation (Wiley Series in Psychology of Crime, Policing and Law)
Understanding Criminal Investigation (Wiley Series in Psychology of Crime, Policing and Law)
This comprehensive volume deciphers investigative process and practice, providing an authoritative insight into key debates and contemporary issues in crime investigations
  • Provides critical examination of investigative practice by focusing on the key issues and debates underpinned by academic literature on crime investigation...
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic...
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and torture are twin evils that have dominated news headlines - particularly since the horrifying events of 9/11. In this thought-provoking volume, scholars from a diverse range of disciplines examine the complex motivational and situational factors contributing to terrorist acts and state-sponsored torture, and the potential linkage...
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy