5bea143b9003d.jpg
PDF
Personal Cybersecurity

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued dev...

5be2317f4dbf8.jpg
PDF
The Effect of Encryption on Lawful Access to Communications and Data

The Internet has become central to global economic activity, politics, and security, and the security environment has changed recently, as we face much more aggressive state actors in espionage. Terrorists and criminals find creative ways to leverage the latest technologies to evade security and privacy protections, but there may be technical and policy solutions that can balance national security and public safety with protection of...

5be156aa1cbe2.jpg
PDF
Police and Society in Brazil

In Brazil, where crime is closely associated with social inequality and failure of the criminal justice system, the police are considered by most to be corrupt, inefficient, and violent, especially when occupying poor areas, and they lack the widespread legitimacy enjoyed by police forces in many nations in the northern hemisphere. This text covers hot-button issues like urban pacification squads, gangs, and drugs, as well as practic...

5be156a418ae1.jpg
PDF
Countering New(est) Terrorism

How should we analyze and assess new terrorist behaviors? What are the particular risks and challenges from new terrorism? Should we negotiate with terrorists, and, if so, how? When should we use force against terrorists? Countering New(est) Terrorism: Hostage-Taking, Kidnapping, and Active Violence―Assessing, Negotiating, and Assaulting improves our knowledge of new terrorist behaviors, and our skills in responding to such attacks. ...

5bdfecea38264.jpg
PDF
Principles of Information Security

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on international...

5bdeac9d519b7.jpg
PDF
Guidelines for Roving Security Inspections in Public Venues Using Explosives Detection Dogs

Guidelines for Roving Security Inspections in Public Venues Using Explosives Detection Dogs grew out of the March 2004 synchronized bombing attack of commuter trains in Madrid, Spain. These guidelines were developed by the T&DI Task Committee on Roving Security Inspections following a teleconference sponsored by the Transportation and Development Institute of ASCE, the Transit Standards Consortium, and the Infrastructure Security...

5bdeac9b20ca8.jpg
PDF
Security Solutions for Hyperconnectivity and the Internet of Things

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and t...

5bdce5ad0fdb4.jpg
PDF
Security and Quality of Service in Ad Hoc Wireless Networks

Ensuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks. Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to vulnerabilities, and the requirements and solutions necessary to tackle them. QoS in relation to ad hoc networks is cove...

5bda72889cb57.jpg
PDF
Introductory Criminology

Introductory Criminology: The Study of Risky Situations takes a unique and intuitive approach to teaching and learning criminology. Avoiding the fragmentation of ideas commonly found in criminology textbooks, Marcus Felson and Mary A. Eckert develop a more practical, readable structure that engages the reader and enhances their understanding of the material. Their descriptive categories, simultaneously broad and realistic, serve bett...

5bda728654f50.jpg
PDF
La sécurité informatique dans la petite entreprise - Etat de l'art et Bonnes Pratiques

Ce livre sur la sécurité informatique dans la petite entreprise (PME) s'adresse aux administrateurs systèmes et réseaux et plus généralement à toute personne appelée à participer à la gestion de l'outil informatique dans ce contexte (chef d'entreprise, formateur…). L'auteur identifie les risques qui rendent l'entreprise vulnérable : menaces externes (Internet) ou internes, logiciels malveillants et attaques affectant le système d'inf...