Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
Adobe Photoshop Forensics
Adobe Photoshop Forensics
Thanks to TV's crime scene investigation shows, forensic technology has entered popular culture. Combining puzzle solving and a dramatic storyline, these shows fascinate audiences as high-tech procedures uncover the truths hidden in seemingly insignificant clues. What many people may not realize is that forensic teams also use items they probably...
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

Discover how to detect fraud, biases, or errors in your data using Access or Excel

With over 300 images, Forensic Analytics reviews and shows how twenty substantive and rigorous tests can be used to detect fraud, errors, estimates, or biases in your data. For each test, the original data is shown with the steps needed to get to the...

Computer Security Handbook, Set
Computer Security Handbook, Set

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer...

Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
This book provides practitioners with an overview of the principles & methods needed to build reliable biometric systems. It covers 3 main topics: key biometric technologies, testing & management issues, & the legal and system considerations of biometric systems for personal verification/identification. It focuses on the 4 most widely...
eBay® QuickSteps, 2nd Edition
eBay® QuickSteps, 2nd Edition
Step-by-Step, Full-Color Graphics!

Get started using eBay right away-the QuickSteps way. Color screenshots and clear instructions show you how to buy and sell just about anything. You'll learn to navigate eBay, become a member, and develop strategies for buying at the lowest prices. You'll also find out how to list your items...

Manager's Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud
Manager's Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud

A recent CBS poll revealed that, as a result of corporate scandals at Enron, WorldCom, Adelphia Communications, and others, a whopping two-thirds of Americans believe that corporate executives are dishonest. This overall assessment is even worse now than during the last financial crises, the savings and loan debacle of the 1980s....

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Sarbanes-Oxley and the Board of Directors : Techniques and Best Practices for Corporate Governance
Sarbanes-Oxley and the Board of Directors : Techniques and Best Practices for Corporate Governance
If you're a sitting or prospective board member of a corporation, how can you ensure that you and other directors are in compliance with Sarbanes-Oxley and other regulatory requirements? How can you maximize your contribution to the board and the company, and minimize your risk as a board member?

Serving on the board of directors of a company...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy