Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Chanakya and the Art of War
Chanakya and the Art of War

Each and every one of us wants to become successful. We aim to fight and win in businesses, careers, relationships and, ultimately, in life. However, most of us fail to reach our full potential because of various speed breakers. Chanakya and the Art of War draws upon lessons from the great teacher, philosopher and strategist...

Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Nightwork: A History of Hacks and Pranks at MIT
Nightwork: A History of Hacks and Pranks at MIT

An MIT "hack" is an ingenious, benign, andanonymous prank or practical joke, often requiring engineering or scientificexpertise and often pulled off under cover of darkness -- instances of campus mischief sometimes coinciding withApril Fool's Day, final exams, or commencement. (It should not beconfused with the sometimes...

Knowledge Management Systems: Value Shop Creation
Knowledge Management Systems: Value Shop Creation
was the value chain developed by Porter (1985). Insights emerged, however, that many organizations have no inbound or outbound logistics of importance, they don’t produce goods in a sequential way and they don’t make money only at the end of their value creation. Therefore, two alternative value configurations have been identified:...
Trust and Legitimacy in Criminal Justice: European Perspectives
Trust and Legitimacy in Criminal Justice: European Perspectives

The book explores police legitimacy and crime control, with a focus on the European region. Using comparative case studies, the contributions to this timely volume examine the effects of a transition to democracy on policing, public attitudes towards police legitimacy, and the ways in which perceptions of police legitimacy relate to...

Colonial Terror: Torture and State Violence in Colonial India
Colonial Terror: Torture and State Violence in Colonial India
Focusing on India between the early nineteenth century and the First World War, Colonial Terror explores the centrality of the torture of Indian bodies to the law-preserving violence of colonial rule and some of the ways in which extraordinary violence was embedded in the ordinary operation of
colonial states. Although
...
Psychology and Law: Truthfulness, Accuracy and Credibility
Psychology and Law: Truthfulness, Accuracy and Credibility

How can psychology inform law and policing to help determine the accuracy of witnesses, victims and suspects?

This second edition of Psychology and Law: Truthfulness, Accuracy and Credibility is a substantially revised and exhaustive review of forensic research to do with credibility and the accuracy of evidence.

...

Fighting Crime Together: The Challenges of Policing and Security Networks
Fighting Crime Together: The Challenges of Policing and Security Networks
Whether they want to or not, police are increasingly having to work with and through many local, national and international partnerships. This edited collection explores the development of policing and security networks. It looks at ways in which police can develop new strategies for integrating the knowledge, capacities and resources of different...
Narrating Narcos: Culiacán and Medellín (Pitt Illuminations)
Narrating Narcos: Culiacán and Medellín (Pitt Illuminations)
Narrating Narcos presents a probing examination of the prominent role of narcotics trafficking in contemporary Latin American cultural production. In her study, Gabriela Polit Dueñas juxtaposes two infamous narco regions, Culiacán, Mexico, and Medellín, Colombia, to demonstrate the powerful forces of violence,...
Advances in Fingerprint Technology, Second Edition (Forensic and Police Science Series)
Advances in Fingerprint Technology, Second Edition (Forensic and Police Science Series)
Fingerprints constitute one of the most important categories of physical evidence, and it is among the few that can be truly individualized. During the last two decades, many new and exciting developments have taken place in the field of fingerprint science, particularly in the realm of methods for developing latent prints and in the growth of...
Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.

This is changing, and quickly. Most records...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy