|
|
|
|
|
|
Investigating Computer CrimeInvestigating Computer Crime will prove a welcome addition to any security department's library. -Security Management
Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the... | | Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in
modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals
wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was
a later version of the term,... | | Geographic Profiling
Scientific criminology has its roots in crime mapping. The first great systematic
studies of crime were cartographic exercises made possible by recordkeeping
systems created to track criminal convictions in France and England
during the early part of the 19th century. Compared with maps of demographic,
economic, and social... |
|
|
|
Result Page: 3 2 1 |