Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Profiling Hackers
  • Language: en
  • Pages: 288

Profiling Hackers

  • Type: Book
  • -
  • Published: 2008-12-11
  • -
  • Publisher: CRC Press

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing ta

Psychology and Law in a Changing World
  • Language: en
  • Pages: 300

Psychology and Law in a Changing World

  • Categories: Law
  • Type: Book
  • -
  • Published: 2013-01-11
  • -
  • Publisher: Routledge

Criminal psychology, and its relationship to the practice of law, has become a topic of major significance over the last three decades. Psychologists play a key role in modern criminal investigation and are central to crime reduction measures such as offender profiling, delinquency prevention and tackling fear of crime. Contributors from North America, Europe and Australia examine this link, both adding to and drawing upon the pool of recent theory construction and empirical work in the following areas: * causes and prevention of offending * studies of crime and offenders * the victim's perspective * witnesses and testimony * studies of legal processes. These issues are studied from a 'local' perspective that recognises not only the need for cross-national comparative research, but also the generation of a corpus of scientific knowledge more representative of the complexity of criminal and legal investigation today.

Understanding and Applying Cryptography and Data Security
  • Language: en
  • Pages: 667

Understanding and Applying Cryptography and Data Security

  • Type: Book
  • -
  • Published: 2009-04-09
  • -
  • Publisher: CRC Press

A How-to Guide for Implementing Algorithms and Protocols Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Foundation for Constructing Cryptographic Protocols The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encrypti...

The Executive MBA for Engineers and Scientists
  • Language: en
  • Pages: 290

The Executive MBA for Engineers and Scientists

  • Type: Book
  • -
  • Published: 2009-12-01
  • -
  • Publisher: CRC Press

All too often, a simple lack of understanding of fundamental business concepts is enough to prevent capable scientists and engineers from receiving otherwise deserved promotions. These days, technical merit and hard work alone no longer guarantee upward mobility. For scientists and engineers with aspirations of moving up the corporate ladder a keen

Mobile Enterprise Transition and Management
  • Language: en
  • Pages: 322

Mobile Enterprise Transition and Management

  • Type: Book
  • -
  • Published: 2009-06-25
  • -
  • Publisher: CRC Press

Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization. The mobile enterprise transition (MET) process presented considers input from the four significant dimensions of an organization - economic, technical, process, and social - making it a well-rounded and complete process. Based on extensive research, literature review, and practical experimentation, this comprehensive text presents emerging best practices, exhaustive case studies, and examples of successful transitions. It also provides detailed references, and a glossary of key terms and commonly used acronyms.

Cyber Infrastructure Protection
  • Language: en
  • Pages: 280

Cyber Infrastructure Protection

  • Type: Book
  • -
  • Published: 2013
  • -
  • Publisher: Unknown

Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation's cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation's mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause dam...

How to Complete a Risk Assessment in 5 Days or Less
  • Language: en
  • Pages: 258

How to Complete a Risk Assessment in 5 Days or Less

  • Type: Book
  • -
  • Published: 2008-11-18
  • -
  • Publisher: CRC Press

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation, How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists, forms, questionnaires, and sample assessments. ...

Information Technology Control and Audit
  • Language: en
  • Pages: 804

Information Technology Control and Audit

  • Type: Book
  • -
  • Published: 2008-11-18
  • -
  • Publisher: CRC Press

The headline-grabbing financial scandals of recent years have led to a great urgency regarding organizational governance and security. Information technology is the engine that runs modern organizations, and as such, it must be well-managed and controlled. Organizations and individuals are dependent on network environment technologies, increasing t

The Executive MBA in Information Security
  • Language: en
  • Pages: 335

The Executive MBA in Information Security

  • Type: Book
  • -
  • Published: 2009-10-09
  • -
  • Publisher: CRC Press

According to the Brookings Institute, an organization's information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of information security programs, it is essential for those in key leadership positions to possess a solid understanding of the constantly evolving fundamental conc

Agency and Bodily Autonomy in Systems of Care
  • Language: en
  • Pages: 195

Agency and Bodily Autonomy in Systems of Care

Agency and Bodily Autonomy in Systems of Care examines the ways in which humans and their bodies become enmeshed in various systems of care. Seven case studies demonstrate the ways in which people lose, negotiate, establish, or impose bodily autonomy in diverse contexts. Diverse methods and perspectives from cultural and medical anthropology, bioarchaeology and public health establish the need for advocacy and policy change to improve health outcomes by re-envisioning systems of care as spaces that include room for individual agency and bodily autonomy. This volume explores diverse subjects to promote advocacy for patient-centered care and bodily autonomy, and for liberation from over-medicalization.