|
Showing 1 - 7 of
7 matches in All Departments
* In-depth, unique coverage of ZSH, one of most modern and powerful
of all shells. Also covers Bash, the preferred shell for most
serious Linux and Unix users. * Very strong author and tech review
team: Co-author Peter Stephenson has been involved in the
development of Zsh since the 1990s when he started to write the
FAQ. For the last few years, he has served as coordinator of the
shell's development. Tech Reviewers: Ed Schaefer is the "Shell
Corner" columnist for SysAdmin Magazine and Bart Schaefer is one of
the lead developers of Zsh development. * Book is immediately
useful, packed with short example and suggestions that the reader
can put to use in their shell environment. * Extensive coverage of
interactive and advanced shell features, including shell
extensions, completion functions, and shortcuts. * Great book for
users of all expertise; perennial seller.
Since the last edition of this book was written more than a decade
ago, cybercrime has evolved. Motives have not changed, but new
means and opportunities have arisen with the advancement of the
digital age. Investigating Computer-Related Crime: Second Edition
incorporates the results of research and practice in a variety of
venues, growth in the field, and new technology to offer a fresh
look at the topic of digital investigation. Following an
introduction to cybercrime and its impact on society, this book
examines: Malware and the important differences between targeted
attacks and general attacks The framework for conducting a digital
investigation, how it is conducted, and some of the key issues that
arise over the course of an investigation How the computer forensic
process fits into an investigation The concept of system glitches
vs. cybercrime and the importance of weeding out incidents that
don't need investigating Investigative politics that occur during
the course of an investigation, whether to involve law enforcement,
and when an investigation should be stopped How to prepare for
cybercrime before it happens End-to-end digital investigation
Evidence collection, preservation, management, and effective use
How to critique your investigation and maximize lessons learned
This edition reflects a heightened focus on cyber stalking and
cybercrime scene assessment, updates the tools used by digital
forensic examiners, and places increased emphases on following the
cyber trail and the concept of end-to-end digital investigation.
Discussion questions at the end of each chapter are designed to
stimulate further debate into this fascinating field.
It is possible and practical to apply information dominance as an
affirmative countermeasure against terrorism by non-state actors in
much the same manner that states use information superiority in the
conduct of international politics and economics. The issue that
this book addresses is whether or not there is sufficient
foundational information relating to terrorism, information
science, international law and information warfare to develop a
generalized meta-framework for applying concepts of information
dominance in a counter-terrorism context much as these principles
are applied in modern state-on-state warfare. We apply our research
to the development of an information dominance meta-framework
applied specifically to the problem of counter-terrorism. The
author concludes that such a meta-framework is both feasible and
practical. The meta-framework (The Counter-Terrorism Information
Dominance Framework, or "CTIDF"), is constructed based upon
information, techniques and technologies that are an
interdisciplinary, holistic approach to the application of elements
of information conflict to the problem of counter-terrorism.
This thesis explores the management of cross-cultural conflict by
Resident Advisors (RA) at the University of Victoria in British
Columbia, Canada. A total of twelve RAs were interviewed on the
policies and expected practices of RAs, how these policies are
implemented and whether these policies are effective in resolving
crosscultural conflict. This research analyzes and demonstrates
that besides conflict itself, the discourse of conflict--how one
speaks about conflict--and its representation are equally
important. In many circumstances, the cultural discourse and its
representation are not only a major part of the problem, but even a
source of it. I argue that a narrow conceptualization of culture in
the expected dispute resolution practices of RAs constrains the
management of disputes between residents. Examples of disputes
pertaining to nationality, racial and sexual discrimination, drugs,
and alcohol illustrate the use of culture as a controlling factor
in conflict, defining culture as bounded and discrete. This
neglects the underlying structural issues at play, serving only to
reproduce conflict and to ensure that social and economic
inequities are passed on.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|