Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies.
Bemærk: Kan ikke leveres før jul.
This groundbreaking text examines for the first time the nature and consequences of crime on the internet; analyzing the new challenges that cybercrimes pose to the criminal justice system.
Bemærk: Kan ikke leveres før jul.
Willie Sutton, a notorious American bank robber of fifty years ago, was once asked why he persisted in robbing banks
Bemærk: Kan ikke leveres før jul.
An effective information security program preserves your information assets and helps you... Læs mere
Bemærk: Kan ikke leveres før jul.
In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion.
Bemærk: Kan ikke leveres før jul.
The first ever professional book on the fascinating and revolutionary area of internet sexuality.
Bemærk: Kan ikke leveres før jul.
This book covers technical details of mobile devices and transmissions as well as forensic methods for extracting evidence. There are books on specific issues like Android Forensics or iOS forensics. But there is not currently a book that covers all the topics this book will.
Bemærk: Kan ikke leveres før jul.
This book covers technical details of mobile devices and transmissions as well as forensic methods for extracting evidence. There are books on specific issues like Android Forensics or iOS forensics. But there is not currently a book that covers all the topics this book will.
Bemærk: Kan ikke leveres før jul.
This book has comprehensive coverage of the principles, basic concepts, structure, modelling, practices, and circuit applications of nanoelectronics in hardware/software security. It will also cover the future research directions in this domain.
Bemærk: Kan ikke leveres før jul.
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world’s first use of digital code... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world’s first use of digital code... Læs mere
Bemærk: Kan ikke leveres før jul.