 |
|
|
 |  |  The Mezonic Agenda: Hacking the Presidency"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will... |  |  Snatched: The FBI's Top Ten Art Crimes and more (Synova's Case Files)
Sit back and relax as Synova regales you with tales of master art thieves, bumbling criminals, and multi-million-dollar art heists from around the world. There will be stories of mafia-commissioned heists, of Daredevil art thieves, and of the brave men and women of the FBI Art team who are trying to stop this multi-billion-dollar industry of art... |
|
 |  |  Fraud Exposed: What You Don't Know Could Cost Your Company MillionsThe $600 billion gorilla in the room
"Dr. Joe Koletar has provided an effective road map to the problem of occupational fraud, in both the public and private sectors, in America. Such frauds affect every American worker, shareholder, and taxpayer. His insights and ideas are an important contribution to the effort to fight this growing... |  |  Incident Response and Computer Forensics, Second EditionCompletely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios
"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine
"This book is an absolute must-read for anyone who plays a role in... |
|
 Critical Incident ManagementThis text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.
Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they... |  |  Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... |  |  |
|
Result Page: 5 4 3 2 1 |