Browse Results

Showing 8,076 through 8,100 of 57,315 results

Computer Fraud Casebook: The Bytes that Bite

by Joseph T. Wells

This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive picture of the many types of computer fraud how they are investigated, across industries and throughout the world. Topics included are email fraud, on-line auction fraud, security breaches, counterfeiting, and others.

Computer-Graphic Facial Reconstruction

by John G. Clement Murray K. Marks

This unique books looks at a cost-efficient, fast and accurate means of facial reconstruction--from segmented, decomposed, or skeletal remains--using computer-graphic and computational means.Computer-Graphic Facial Reconstruction is designed as a valuable resource for those scientists designing new research projects and protocols, as well as a practical handbook of methods and techniques for medico-legal practitioners who actually identify the faceless victims of crime. It looks at a variety of approaches: artificial intelligence using neural networks, case-based reasoning, Baysian belief systems, along with a variety of imaging methods: radiological, CT, MRI and the use of imaging devices.The methods described in this book complement, or may even replace, the less-reliable, more traditional means of securing identification by presumptive means, i.e., recognition of clothing, personal effects and clay reconstruction.- Covers cutting-edge technologies in the context of historical forensic reconstruction methods- Features stellar authors from around the globe- Bridges the areas of computer graphics, animation, and forensic anthropology

Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response

by Leighton Johnson

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.Provides readers with a complete handbook on computer incident response from the perspective of forensics team managementIdentify the key steps to completing a successful computer incident response investigationDefines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams

Computer Law (PDF)

by Chris Reed

This edition is fully updated to reflect the Digital Economy Act 2010 and changes to consumer protection law at EU level including the Unfair Commercial Practices Directive. Analysis of recent case law is also incorporated including, amongst others, the series of trade mark actions against eBay and copyrights suits against Google as well as the implications for IT contracts of BSkyB Ltd v HP Enterprise Services UK Ltd. All chapters have been revised to take into account the rapid evolution of the ways in which we consume, generate, store and exchange information, such as cloud computing, off-shoring and Web 2.0.

Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings (Lecture Notes in Computer Science #10446)

by Jacek Rak John Bay Igor Kotenko Leonard Popyack Victor Skormin Krzysztof Szczypiorski

This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security.

Computer Security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11981)

by Apostolos P. Fournaris Manos Athanatos Konstantinos Lampropoulos Sotiris Ioannidis George Hatzivasilis Ernesto Damiani Habtamu Abie Silvio Ranise Luca Verderame Alberto Siena Joaquin Garcia-Alfaro

This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The IOSec Workshop received 17 submissions from which 7 full papers were selected for presentation. They cover topics related to security architectures and frameworks for enterprises, SMEs, public administration or critical infrastructures, threat models for IT & OT systems and communication networks, cyber-threat detection, classification and pro ling, incident management, security training and awareness, risk assessment safety and security, hardware security, cryptographic engineering, secure software development, malicious code analysis as well as security testing platforms. From the MSTEC Workshop 7 full papers out of 15 submissions are included. The selected papers deal focus on the verification and validation (V&V) process, which provides the operational community with confidence in knowing that cyber models represent the real world, and discuss how defense training may benefit from cyber models. The FINSEC Workshop received 8 submissions from which 3 full papers and 1 short paper were accepted for publication. The papers reflect the objective to rethink cyber-security in the light of latest technology developments (e.g., FinTech, cloud computing, blockchain, BigData, AI, Internet-of-Things (IoT), mobile-first services, mobile payments).

Computer Security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11387)

by Sokratis K. Katsikas Frédéric Cuppens Nora Cuppens Costas Lambrinoudakis Annie Antón Stefanos Gritzalis John Mylopoulos Christos Kalloniatis

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II (Lecture Notes in Computer Science #11099)

by Javier Lopez Jianying Zhou Miguel Soriano

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I (Lecture Notes in Computer Science #11098)

by Javier Lopez Jianying Zhou Miguel Soriano

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I (Lecture Notes in Computer Science #10492)

by Simon N. Foley Dieter Gollmann Einar Snekkenes

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Computer Software and Intellectual Property

by Office of Technology Assessment

A report offering a review of existing intellectual property protection for computer softwear, protection of copyright, patents and trade secrets, a statement of current problems and the extent to which US legislature might solve them, and the view of industry and others in the computer community.

Computer- und Internetstrafrecht: Ein Grundriss (Springer-Lehrbuch)

by Eric Hilgendorf Thomas Frank Brian Valerius

Die moderne Informations- und Kommunikationstechnologie stellt das Recht vor neue Herausforderungen. Das Lehrbuch vermittelt einen umfassenden und zugleich detaillierten Überblick über das Computer- und Internetstrafrecht, angefangen vom klassischen Computerbetrug und Hacking von Daten bis hin zu den jüngsten kriminellen Erscheinungsformen wie Domain-Hijacking und Phishing. Darüber hinaus widmet es sich auch künftigen Entwicklungen, vor allem der zunehmenden Internationalisierung des Rechts auf diesem Gebiet.

Computer- und Internetstrafrecht: Ein Grundriss (Springer-Lehrbuch)

by Eric Hilgendorf Carsten Kusche Brian Valerius

Die Informations- und Kommunikationstechnologie stellt das Strafrecht vor die Aufgabe, sowohl klassische Delikte in ihrem neuen technisierten Gewand zu erfassen als auch ganz neuen Kriminalitätsformen zu begegnen. Das Lehrbuch vermittelt einen umfassenden Überblick über das Rechtsgebiet und zeigt die aktuellen Probleme auf. Die 2. Auflage berücksichtigt Entwicklungen in Gesetzgebung und Rechtsprechung und enthält ein neues Kapitel zu strafverfahrensrechtlichen Fragen im Zusammenhang mit Computern und Computernetzwerken.

Computer- und Internetstrafrecht: Ein Grundriss (Springer-Lehrbuch)

by Eric Hilgendorf Brian Valerius

Die Informations- und Kommunikationstechnologie stellt das Strafrecht vor die Aufgabe, sowohl klassische Delikte in ihrem neuen technisierten Gewand zu erfassen als auch ganz neuen Kriminalitätsformen zu begegnen. Das Lehrbuch vermittelt einen umfassenden Überblick über das Rechtsgebiet und zeigt die aktuellen Probleme auf. Die 2. Auflage berücksichtigt Entwicklungen in Gesetzgebung und Rechtsprechung und enthält ein neues Kapitel zu strafverfahrensrechtlichen Fragen im Zusammenhang mit Computern und Computernetzwerken.

The Computerised Lawyer: A Guide to the Use of Computers in the Legal Profession (Applications of Advanced Computing Techniques)

by Philip Leith

The aim of the Applications of Advanced Computing Techniques Series is to publish accounts of particular computer application areas which provide good examples of advanced practice in the fields concerned. In some volumes, the techniques described will be advanced because of the particular computer technologies used. In other volumes the techniques will be advanced because they illustrate new ways of using computing in particular fields, or because they raise new social and ethical issues. All the volumes are designed to be readable both for practitioners working in the application area concerned (in this case lawyers) and for computer professionals interested in leading edge applications. Philip Leith meets all these objectives in this volume. The first four chapters provide a valuable introduction to computer concepts and methods of holding information, from the specific point of view of the practising lawyer or student. Whilst some of these issues may be familiar to computer practitioners it is only through a proper appreciation of the technology that the real benefits to the working lawyer become clear.

Computers, Privacy and Data Protection: an Element of Choice

by Serge Gutwirth, Yves Poullet, Paul De Hert and Ronald Leenes

This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.

Computerunterstützte Führung in Kommunalverwaltung und -politik: Steuerung mit New Public Management und Informationstechnologie (Informationsmanagement und Computer Aided Team)

by Bernd Vöhringer

Bernd Vöhringer analysiert die Arbeitssituation von Verwaltungsführungskräften und Gemeinderäten sowie die damit verbundenen Unterstützungspotenziale und entwickelt eine Konzeption für ein Informationssystem, das die kommunalpolitische Führung im Rahmen des New Public Management unterstützt.

The Con

by Karen Woods

A mother will do anything to protect her child…

Con Artists in Cinema: Self-Knowledge, Female Power, and Love (Routledge Focus on Film Studies)

by Joseph H. Kupfer

This book examines the con artist film as a genre, exploring its main features while also addressing variations within it. The volume explores three diverse themes of the con artist film: edification, self-awareness, and liberation through con games; the femme fatale as con artist; and romantic love as a plot point. Analyzing movies such as Matchstick Men (2003), House of Games (1987), Body Heat (1981), The Last Seduction (1994), Birthday Girl (2001), and The Game (1997), the book also explores their psychological investigation of the con artist figure, the con artist’s mark, and how the dynamic between these roles implicates us as the audience. It also addresses the con artist film genre’s close association with neo-noir, especially through the femme fatale figure, investigating and updating the rich tradition of noir film. Demonstrating the range and flexibility of this understudied genre, this book will be of interest to scholars and students of film studies, ethics, and those studying the representation of women in film..

Con Artists in Cinema: Self-Knowledge, Female Power, and Love (Routledge Focus on Film Studies)

by Joseph H. Kupfer

This book examines the con artist film as a genre, exploring its main features while also addressing variations within it. The volume explores three diverse themes of the con artist film: edification, self-awareness, and liberation through con games; the femme fatale as con artist; and romantic love as a plot point. Analyzing movies such as Matchstick Men (2003), House of Games (1987), Body Heat (1981), The Last Seduction (1994), Birthday Girl (2001), and The Game (1997), the book also explores their psychological investigation of the con artist figure, the con artist’s mark, and how the dynamic between these roles implicates us as the audience. It also addresses the con artist film genre’s close association with neo-noir, especially through the femme fatale figure, investigating and updating the rich tradition of noir film. Demonstrating the range and flexibility of this understudied genre, this book will be of interest to scholars and students of film studies, ethics, and those studying the representation of women in film..

Con Law: Con Law Ii

by Mark Gimenez

John Bookman - Book to his friends - is a tenured professor at the University of Texas School of Law. He's thirty-five, handsome and unmarried. He teaches Constitutional Law, reduces senators to blithering fools on talk shows, and is often mentioned as a future Supreme Court nominee. But Book is also famous for something more unusual. He likes to take on lost causes and win. Consequently, when he arrives at the law school each Monday morning, hundreds of letters await him, letters from desperate Americans around the country seeking his help. Every now and then, one letter captures his attention and Book feels compelled to act.In the first of a thrilling new series from the author of international bestsellers The Colour of Law and Accused, Book investigates a murder set in the high-stakes world of fracking and corruption in deepest, darkest Texas.

Concealment and Exposure: And Other Essays

by Thomas Nagel

Thomas Nagel is widely recognized as one of the top American philosophers working today. Reflecting the diversity of his many philosophical preoccupations, this volume is a collection of his most recent critical essays and reviews. The first section, Public and Private, focuses on the notion of privacy in the context of social and political issues, such as the impeachment of President Clinton. The second section, Right and Wrong, discusses moral, political and legal theory, and includes pieces on John Rawls, G.A. Cohen, and T.M. Scanlon, among others. The final section, Mind and Reality, features discussions of Richard Rorty, Donald Davidson, and the Sokal hoax, and closes with a substantial new essay on the mind-body problem. Written with characteristic rigor, these pieces reveal the intellectual passion underlying the incisive analysis for which Nagel is known.

Conceiving Life: Reproductive Politics and the Law in Contemporary Italy

by Patrick Hanafin

This volume examines the evolution of reproductive law in Italy from the `far west' of the 1980s and 90s through to one of the most potentially restrictive systems in Europe. The book employs an array of sociological, philosophical and legal material in order to discover why such a repressive piece of legislation has been produced at the end of a period of substantial change in the dynamic of gender relations in Italy. The book also discusses Italian policy within the wider European policy framework.

Refine Search

Showing 8,076 through 8,100 of 57,315 results