Author: Gerhard Swanepoel
Publisher: Pearson South Africa
ISBN: 9781770252370
Category : Criminology
Languages : en
Pages : 212
Book Description
FCS Criminology L2
Author: Gerhard Swanepoel
Publisher: Pearson South Africa
ISBN: 9781770252370
Category : Criminology
Languages : en
Pages : 212
Book Description
Publisher: Pearson South Africa
ISBN: 9781770252370
Category : Criminology
Languages : en
Pages : 212
Book Description
FCS Principles of Criminal Justice L2
Author:
Publisher: Pearson South Africa
ISBN: 9781770252356
Category : Criminal justice, Administration of
Languages : en
Pages : 216
Book Description
Publisher: Pearson South Africa
ISBN: 9781770252356
Category : Criminal justice, Administration of
Languages : en
Pages : 216
Book Description
FCS Introduction to Law L2
Author:
Publisher: Pearson South Africa
ISBN: 9781770255074
Category : Competency-based education
Languages : en
Pages : 292
Book Description
Publisher: Pearson South Africa
ISBN: 9781770255074
Category : Competency-based education
Languages : en
Pages : 292
Book Description
High-tech Crimes Revealed
Author: Steven Branigan
Publisher: Addison-Wesley Professional
ISBN:
Category : Computers
Languages : en
Pages : 452
Book Description
With a target audience of computer security and other information technology professionals, Branigan (president, CyanLine LLC) focuses on the people more than the technology in his discussion of cybercrime and its investigation. He describes cases he's been involved with, some as a law enforcement officer, in order to give professionals an idea of how criminals exploit computer weaknesses and what can be done to catch them. After describing such episodes as an attack on a telephone network, an attack on an ISP, and a case of identity theft, he proceeds to a more general discussion of cybercrime, exploring such questions as why hackers hack and the proper conduct of criminal investigation.
Publisher: Addison-Wesley Professional
ISBN:
Category : Computers
Languages : en
Pages : 452
Book Description
With a target audience of computer security and other information technology professionals, Branigan (president, CyanLine LLC) focuses on the people more than the technology in his discussion of cybercrime and its investigation. He describes cases he's been involved with, some as a law enforcement officer, in order to give professionals an idea of how criminals exploit computer weaknesses and what can be done to catch them. After describing such episodes as an attack on a telephone network, an attack on an ISP, and a case of identity theft, he proceeds to a more general discussion of cybercrime, exploring such questions as why hackers hack and the proper conduct of criminal investigation.
Network Security
Author: Jan L. Harrington
Publisher: Elsevier
ISBN: 0080455379
Category : Computers
Languages : en
Pages : 385
Book Description
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You'll learn to do just that with this book's assessments of the risks, rewards, and trade-offs related implementing security measures. - Helps you see through a hacker's eyes so you can make your network more secure. - Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. - Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. - Covers techniques for enhancing the physical security of your systems and network. - Explains how hackers use information-gathering to find and exploit security flaws. - Examines the most effective ways to prevent hackers from gaining root access to a server. - Addresses Denial of Service attacks, "malware," and spoofing. - Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
Publisher: Elsevier
ISBN: 0080455379
Category : Computers
Languages : en
Pages : 385
Book Description
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You'll learn to do just that with this book's assessments of the risks, rewards, and trade-offs related implementing security measures. - Helps you see through a hacker's eyes so you can make your network more secure. - Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. - Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. - Covers techniques for enhancing the physical security of your systems and network. - Explains how hackers use information-gathering to find and exploit security flaws. - Examines the most effective ways to prevent hackers from gaining root access to a server. - Addresses Denial of Service attacks, "malware," and spoofing. - Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
Machine Learning, Advances in Computing, Renewable Energy and Communication
Author: Anuradha Tomar
Publisher: Springer Nature
ISBN: 9811623546
Category : Technology & Engineering
Languages : en
Pages : 651
Book Description
This book gathers selected papers presented at International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication (MARC 2020), held in Krishna Engineering College, Ghaziabad, India, during December 17–18, 2020. This book discusses key concepts, challenges, and potential solutions in connection with established and emerging topics in advanced computing, renewable energy, and network communications.
Publisher: Springer Nature
ISBN: 9811623546
Category : Technology & Engineering
Languages : en
Pages : 651
Book Description
This book gathers selected papers presented at International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication (MARC 2020), held in Krishna Engineering College, Ghaziabad, India, during December 17–18, 2020. This book discusses key concepts, challenges, and potential solutions in connection with established and emerging topics in advanced computing, renewable energy, and network communications.
Foster Care Independence Act of 1999
Author: United States
Publisher:
ISBN:
Category : Foster children
Languages : en
Pages : 14
Book Description
Publisher:
ISBN:
Category : Foster children
Languages : en
Pages : 14
Book Description
Writer Identification and Verification
Author: Andreas Schlapbach
Publisher: IOS Press
ISBN: 9783898383110
Category : Computer vision
Languages : en
Pages : 164
Book Description
Publisher: IOS Press
ISBN: 9783898383110
Category : Computer vision
Languages : en
Pages : 164
Book Description
Nuclear Non-proliferation and Arms Control Verification
Author: Irmgard Niemeyer
Publisher: Springer Nature
ISBN: 3030295370
Category : Law
Languages : en
Pages : 449
Book Description
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.
Publisher: Springer Nature
ISBN: 3030295370
Category : Law
Languages : en
Pages : 449
Book Description
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.
Women, Monstrosity and Horror Film
Author: Erin Harrington
Publisher: Routledge
ISBN: 113477933X
Category : Social Science
Languages : en
Pages : 315
Book Description
Women occupy a privileged place in horror film. Horror is a space of entertainment and excitement, of terror and dread, and one that relishes the complexities that arise when boundaries – of taste, of bodies, of reason – are blurred and dismantled. It is also a site of expression and exploration that leverages the narrative and aesthetic horrors of the reproductive, the maternal and the sexual to expose the underpinnings of the social, political and philosophical othering of women. This book offers an in-depth analysis of women in horror films through an exploration of ‘gynaehorror’: films concerned with all aspects of female reproductive horror, from reproductive and sexual organs, to virginity, pregnancy, birth, motherhood and finally to menopause. Some of the themes explored include: the intersection of horror, monstrosity and sexual difference; the relationships between normative female (hetero)sexuality and the twin figures of the chaste virgin and the voracious vagina dentata; embodiment and subjectivity in horror films about pregnancy and abortion; reproductive technologies, monstrosity and ‘mad science’; the discursive construction and interrogation of monstrous motherhood; and the relationships between menopause, menstruation, hagsploitation and ‘abject barren’ bodies in horror. The book not only offers a feminist interrogation of gynaehorror, but also a counter-reading of the gynaehorrific, that both accounts for and opens up new spaces of productive, radical and subversive monstrosity within a mode of representation and expression that has often been accused of being misogynistic. It therefore makes a unique contribution to the study of women in horror film specifically, while also providing new insights in the broader area of popular culture, gender and film philosophy.
Publisher: Routledge
ISBN: 113477933X
Category : Social Science
Languages : en
Pages : 315
Book Description
Women occupy a privileged place in horror film. Horror is a space of entertainment and excitement, of terror and dread, and one that relishes the complexities that arise when boundaries – of taste, of bodies, of reason – are blurred and dismantled. It is also a site of expression and exploration that leverages the narrative and aesthetic horrors of the reproductive, the maternal and the sexual to expose the underpinnings of the social, political and philosophical othering of women. This book offers an in-depth analysis of women in horror films through an exploration of ‘gynaehorror’: films concerned with all aspects of female reproductive horror, from reproductive and sexual organs, to virginity, pregnancy, birth, motherhood and finally to menopause. Some of the themes explored include: the intersection of horror, monstrosity and sexual difference; the relationships between normative female (hetero)sexuality and the twin figures of the chaste virgin and the voracious vagina dentata; embodiment and subjectivity in horror films about pregnancy and abortion; reproductive technologies, monstrosity and ‘mad science’; the discursive construction and interrogation of monstrous motherhood; and the relationships between menopause, menstruation, hagsploitation and ‘abject barren’ bodies in horror. The book not only offers a feminist interrogation of gynaehorror, but also a counter-reading of the gynaehorrific, that both accounts for and opens up new spaces of productive, radical and subversive monstrosity within a mode of representation and expression that has often been accused of being misogynistic. It therefore makes a unique contribution to the study of women in horror film specifically, while also providing new insights in the broader area of popular culture, gender and film philosophy.