![]() |
![]() |
Your cart is empty |
||
Showing 1 - 7 of 7 matches in All Departments
* In-depth, unique coverage of ZSH, one of most modern and powerful of all shells. Also covers Bash, the preferred shell for most serious Linux and Unix users. * Very strong author and tech review team: Co-author Peter Stephenson has been involved in the development of Zsh since the 1990s when he started to write the FAQ. For the last few years, he has served as coordinator of the shell's development. Tech Reviewers: Ed Schaefer is the "Shell Corner" columnist for SysAdmin Magazine and Bart Schaefer is one of the lead developers of Zsh development. * Book is immediately useful, packed with short example and suggestions that the reader can put to use in their shell environment. * Extensive coverage of interactive and advanced shell features, including shell extensions, completion functions, and shortcuts. * Great book for users of all expertise; perennial seller.
Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the field, and new technology to offer a fresh look at the topic of digital investigation. Following an introduction to cybercrime and its impact on society, this book examines: Malware and the important differences between targeted attacks and general attacks The framework for conducting a digital investigation, how it is conducted, and some of the key issues that arise over the course of an investigation How the computer forensic process fits into an investigation The concept of system glitches vs. cybercrime and the importance of weeding out incidents that don't need investigating Investigative politics that occur during the course of an investigation, whether to involve law enforcement, and when an investigation should be stopped How to prepare for cybercrime before it happens End-to-end digital investigation Evidence collection, preservation, management, and effective use How to critique your investigation and maximize lessons learned This edition reflects a heightened focus on cyber stalking and cybercrime scene assessment, updates the tools used by digital forensic examiners, and places increased emphases on following the cyber trail and the concept of end-to-end digital investigation. Discussion questions at the end of each chapter are designed to stimulate further debate into this fascinating field.
It is possible and practical to apply information dominance as an affirmative countermeasure against terrorism by non-state actors in much the same manner that states use information superiority in the conduct of international politics and economics. The issue that this book addresses is whether or not there is sufficient foundational information relating to terrorism, information science, international law and information warfare to develop a generalized meta-framework for applying concepts of information dominance in a counter-terrorism context much as these principles are applied in modern state-on-state warfare. We apply our research to the development of an information dominance meta-framework applied specifically to the problem of counter-terrorism. The author concludes that such a meta-framework is both feasible and practical. The meta-framework (The Counter-Terrorism Information Dominance Framework, or "CTIDF"), is constructed based upon information, techniques and technologies that are an interdisciplinary, holistic approach to the application of elements of information conflict to the problem of counter-terrorism.
This thesis explores the management of cross-cultural conflict by Resident Advisors (RA) at the University of Victoria in British Columbia, Canada. A total of twelve RAs were interviewed on the policies and expected practices of RAs, how these policies are implemented and whether these policies are effective in resolving crosscultural conflict. This research analyzes and demonstrates that besides conflict itself, the discourse of conflict--how one speaks about conflict--and its representation are equally important. In many circumstances, the cultural discourse and its representation are not only a major part of the problem, but even a source of it. I argue that a narrow conceptualization of culture in the expected dispute resolution practices of RAs constrains the management of disputes between residents. Examples of disputes pertaining to nationality, racial and sexual discrimination, drugs, and alcohol illustrate the use of culture as a controlling factor in conflict, defining culture as bounded and discrete. This neglects the underlying structural issues at play, serving only to reproduce conflict and to ensure that social and economic inequities are passed on.
|
![]() ![]() You may like...
The Unresolved National Question - Left…
Edward Webster, Karin Pampallis
Paperback
![]()
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, …
Paperback
Agency, Norms, Inquiry, and Artifacts…
Paul McNamara, Andrew J.I. Jones, …
Hardcover
R4,242
Discovery Miles 42 420
|