FCS Criminology L3
Title | FCS Criminology L3 PDF eBook |
Author | |
Publisher | Pearson South Africa |
Pages | 204 |
Release | 2009 |
Genre | Criminology |
ISBN | 9781770253582 |
FCS Theory of Policing Practices L3
Title | FCS Theory of Policing Practices L3 PDF eBook |
Author | |
Publisher | Pearson South Africa |
Pages | 164 |
Release | |
Genre | |
ISBN | 9781770254305 |
FCS Integrated English for First Additional Language L3
Title | FCS Integrated English for First Additional Language L3 PDF eBook |
Author | Bernita Naudé |
Publisher | Pearson South Africa |
Pages | 372 |
Release | 2009 |
Genre | English language |
ISBN | 9781770254848 |
FCS Criminal Justice Structures and Mandates L3
Title | FCS Criminal Justice Structures and Mandates L3 PDF eBook |
Author | |
Publisher | Pearson South Africa |
Pages | 212 |
Release | 2009 |
Genre | Criminal law |
ISBN | 9781770253544 |
FCS Criminal Law L3
Title | FCS Criminal Law L3 PDF eBook |
Author | |
Publisher | Pearson South Africa |
Pages | 236 |
Release | |
Genre | |
ISBN | 9781770253568 |
FCS Governance L3
Title | FCS Governance L3 PDF eBook |
Author | |
Publisher | Pearson South Africa |
Pages | 196 |
Release | 2009 |
Genre | South Africa |
ISBN | 9781770254367 |
High-tech Crimes Revealed
Title | High-tech Crimes Revealed PDF eBook |
Author | Steven Branigan |
Publisher | Addison-Wesley Professional |
Pages | 452 |
Release | 2005 |
Genre | Computers |
ISBN |
With a target audience of computer security and other information technology professionals, Branigan (president, CyanLine LLC) focuses on the people more than the technology in his discussion of cybercrime and its investigation. He describes cases he's been involved with, some as a law enforcement officer, in order to give professionals an idea of how criminals exploit computer weaknesses and what can be done to catch them. After describing such episodes as an attack on a telephone network, an attack on an ISP, and a case of identity theft, he proceeds to a more general discussion of cybercrime, exploring such questions as why hackers hack and the proper conduct of criminal investigation.