This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective.
This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective.
Adopting a case-based approach, Global Financial Investigations introduces the fascinating world of forensic accounting and investigating transnational financial crimes, providing an overview of core concepts and current industry trends, together with practical guidance to equip readers with the knowledge required to combat complex financial crimes.
Facilitated by developments in technologies, the non-consensual posting of sexually explicit images of someone else for revenge, entertainment or political motive - so-called revenge porn - has become a global phenomenon.
The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces.
The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment.
Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guideThis thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam.
Fully up-to-date coverage of every topic on the CEH v9 certification examThoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam.
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries.
Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse.
Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse.
The Routledge Handbook of International Crime and Justice Studies presents the enduring debates and emerging challenges in crime and justice studies from an international and multi-disciplinary perspective.
The Routledge Handbook of International Crime and Justice Studies presents the enduring debates and emerging challenges in crime and justice studies from an international and multi-disciplinary perspective.
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet the requirements of privacy laws.
Over the last decade there has been dramatically increased interest in the ways that technology has been used in the abuse and exploitation of children, due in part to increasing numbers of convictions for child pornography-related offenses.
Over the last decade there has been dramatically increased interest in the ways that technology has been used in the abuse and exploitation of children, due in part to increasing numbers of convictions for child pornography-related offenses.
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world.
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens.