Digital Evidence and Computer Crime, Second EditionDigital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an... | | PHP for the World Wide Web Visual Quickstart GuideWhile there are several professional-level books available on PHP, there are few guides to this open-source scripting language for students who may be familiar with HTML but are not studying to be professional programmers. PHP for the World Wide Web: Visual QuickStart Guide is a task-based, visual reference guide... | | Kerberos: The Definitive GuideKerberos is a sophisticated network authentication system—one that has been publicly available since 1989 and provides that eternal holy grail of network administrators, single-sign-on. Yet, in that intervening decade, documentation on Kerberos has been notably lacking. While many large organizations and academic institutions have enjoyed the... |