Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
The man who is "e;the embodiment of the Mythbusters, Sherlock Holmes, and Richard Feynman"e; weeds out the treasures from the shams in artifact investigations (Michael Shermer, founding publisher of Skeptic magazine).
Dynamically written and richly illustrated, the Routledge International Handbook of Visual Criminology offers the first foundational primer on visual criminology.
The Routledge International Handbook on Fear of Crime brings together original and international state of the art contributions of theoretical, empirical, policy-related scholarship on the intersection of perceptions of crime, victimisation, vulnerability and risk.
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and "e;canceling"e; people for perceived violations of norms.
Forensic Textile Science provides an introduction to textile science, emphasizing the terminology of the discipline and offering detailed coverage of the ways textile damage analysis can be used in forensics.
This book contributes to and broadens the field of Border Criminology, by bringing together a collection of chapters from leading scholars engaged in cross-national and comparative conversations on bordered penality and crimmigration practices, with a specific focus on research conducted in places that may be considered peripheral and semi-peripheral jurisdictions.
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks.
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI).
From the fearless defense attorney and civil rights lawyer who rose to fame with NetflixsThe Staircasecomes a bracing account of abuses of power and corruption in the criminal justice system.
This book examines the concept of witness protection which is still at an early developmental stage in several African countries including Nigeria, from a legal and institutional perspective.
This book explores how organized crime has adapted and evolved in sync with ever-expanding technologies to update its popular image and to conduct its covert operations.
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size.
This ground-breaking textbook engages readers in conversation about responding to the effects of diversity within formal criminal justice systems in Westernized nation-states.
Drawing from an interdisciplinary body of research and data, Women of Piracy employs a criminological lens to explore how women have been involved in, and impacted by, maritime piracy operations from the 16th century to present day piracy off the coast of Somalia.
Prison Segregation: The Limits of Law explores the use of segregation in English prisons by examining how law is used and experienced, and how human rights are upheld.
This book offers a critical and empirical examination of gang life, using an intersectional framework considering race, class, gender, and other characteristics.
Prison Segregation: The Limits of Law explores the use of segregation in English prisons by examining how law is used and experienced, and how human rights are upheld.
This book moves beyond rehabilitative strategies in corrections to engage a more holistic understanding of the communal experiences behind prison walls.
With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity.
With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity.
TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case.
Alcohol, Crime and Public Health explores the issue of drinking in the criminal justice system, providing an overview of the topic from both a criminal justice and a public health perspective.
Learn to pull "e;digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques.
This book addresses the need for policing scholarship to strengthen its empirical cumulative knowledge base by replicating and reproducing earlier studies.
Because the investigation of cold cases is usually an arduous and time-consuming task, most law enforcement agencies in the United States are not able to dedicate the resources necessary to support the cold case investigation process.
Domestic Violence and Criminal Justice, Second Edition, offers readers an overview of domestic violence and its effects on society and includes helpful measures to curtail its rapid growth and widespread harm.
Medical and Veterinary Entomology is a comprehensive text and is primarily intended for graduate students and upper level undergraduates studying the medical and veterinary significance of insects and related arthropods.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
This book provides an original theoretically and empirically grounded analysis of regulatory enforcement activism in post-crises periods and the ensuing regulatory interactions.
The Political Economy of Plea Bargaining provides the political, economic, and cultural context for understanding the evolution of plea bargaining as a juridical technology implemented to ensure the efficient administration of violations of criminal law.
Presenting cutting-edge research and scholarship, this extensive volume covers everything from abstract theorising about the meanings of responsibility and how we blame, to analysing criminal law and justice responses, and factors that impact individual responsibility.
Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company.