Drug Use and Abuse: A Comprehensive Introduction
Packed with the latest data and research, the powerful new DRUG USE AND ABUSE: A COMPREHENSIVE INTRODUCTION, 8e delivers a thorough, interdisciplinary survey of all aspects of drug and alcohol abuse. The text draws from the many disciplines of history, law, pharmacology, political science, social work, counseling, psychology, sociology, and... | | Privacy and Big Data
Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once... | | Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you... |