|
|
|
Moodle Security
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys... | | Scene of the Cybercrime: Computer Forensics Handbook
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and... | | The Cambridge Handbook of Information and Computer Ethics
Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary... |
|
Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... | | The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy
Information is a two edged sword that can both help and hinder modern society. The Art of Information Warfare is the first common-sense primer on the subject written for those interested in or requiring a practical orientation to the threats and issues associated with today's Information Society from military, corporate, and... | | Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your... |
|
Computer Fraud Casebook: The Bytes that BiteIn 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer... | | Game Character Animation All in OneWithin the world of video games, characters become almost living entities. Through the use of logic and artificial intelligence, the video-game character is able to act and react to each situation. As the designer, you hold the character's creative expression in your control. Game Character Animation All in One is a comprehensive guide to the... | | |
|
Result Page: 23 22 21 20 19 18 17 16 15 14 |