![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader's hands.
A unique and comprehensive overview of the field and its current issues, Cybercriminology analyzes cybercrimes through the lens of criminology. Featuring an accessible, conversational writing style, it first discusses traditional criminological theories of criminal behavior and then analyzes how these theories-the existing literature and empirical studies-can be applied to explain cybercrimes. The text also introduces students to types of cybercrime, the nature and extent of cybercrime in the U.S. and abroad, and victim and offender behavior in the online environment. FEATURES * Real-world case studies and examples demonstrate the extent and complexity of cybercriminology * Boxed features present compelling research topics and scenarios * Review questions stimulate classroom discussions * An Ancillary Resource Center contains an Instructor's Manual, a Test Bank, and PowerPoint lecture outlines
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and institutions around the world. Transnational Security addresses these issues, which are at the forefront of every global security professional's agenda. This book analyzes the most pressing current transnational security threats, including weapons of mass destruction, terrorism, organized crime, cybercrime, natural disasters, human-made disasters, infectious diseases, food insecurity, water insecurity, and energy insecurity. It considers the applicable international laws and examines how key international organizations are dealing with these issues. The author uses a combination of theory and real-world examples to illustrate the transnational nature of security risks. By providing a detailed account of the different threats, countermeasures, and their implications for a number of different fields-law, public policy and administration, security, and criminology-this book will be an extremely useful resource for academicians, practitioners, and graduate and upper-level undergraduate students in these areas.
An Updated Edition Of The Definitive Computer Forensics Text Updated To Include The Most Current Events And Information On Cyberterrorism, The Second Edition Of Computer Forensics: Cybercriminals, Laws, And Evidence Continues To Balance Technicality And Legal Analysis As It Enters Into The World Of Cybercrime By Exploring What It Is, How It Is Investigated, And The Regulatory Laws Around The Collection And Use Of Electronic Evidence. Students Are Introduced To The Technology Involved In Computer Forensic Investigations And The Technical And Legal Difficulties Involved In Searching, Extracting, Maintaining, And Storing Electronic Evidence, While Simultaneously Looking At The Legal Implications Of Such Investigations And The Rules Of Legal Procedure Relevant To Electronic Evidence. Significant And Current Computer Forensic Developments Are Examined, As Well As The Implications For A Variety Of Fields Including Computer Science, Security, Criminology, Law, Public Policy, And Administration.
|
You may like...
Mathematics for Young Learners - A Guide…
Rosalind Charlesworth, Karen Lind, …
Paperback
We Are Still Human - And Work Shouldn't…
Brad Shorkend, Andy Golding
Paperback
(2)
|