Catálogo de publicaciones

Compartir en
redes sociales


Navegación

Tipo

Acceso

Plataformas

Temática

Año de publicación

Mostrando 10 de 30.469 registro(s)

Filtros tipo quitar todos
libros

Scattering from Model Nonspherical Particles: Theory and Applications to Environmental Physics

Ferdinando Borghese ; Paolo Denti ; Rosalba Saija
Identificadores:  ISBN 978-3-540-37413-8 (impreso) 978-3-540-37414-5 (en línea)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

libros

Scenario Logic and Probabilistic Management of Risk in Business and Engineering

E. D. Solojentsev
Identificadores:  ISBN 978-1-4020-2977-6 (impreso) 978-1-4020-2978-3 (en línea)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

libros

Scenarios: Models, Transformations and Tools: International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers

Identificadores:  ISBN 978-3-540-26189-6 (impreso) 978-3-540-32032-6 (en línea)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

libros

Scene of the Cybercrime

Identificadores:  ISBN 978-1-59749-276-8 (en línea)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard.

Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws.


* Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations.
* Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard
* Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones.
libros Acceso Abierto

Scenes of Sympathy: Identity and Representation in Victorian Fiction

Audrey Jaffe
Identificadores:  ISBN 978-0-80143-712-0 (impreso) 978-1-50171-997-4 (en línea)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

libros Acceso Abierto

Scents that matter-from olfactory stimuli to genes, behaviors and beyond

Identificadores:  ISBN 9782889198139 (impreso)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

libros Acceso Abierto

Schadensminderungspflichten im Haftpflicht- und Sozialrecht Deutschlands, Österreichs und der Schweiz

Claudia Matthäus
Identificadores:  ISBN 978-3-83293-722-5 (impreso) 978-3-84521-102-2 (en línea)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

libros Acceso Abierto

Schatten des Volkes. Benjamin Constant und die Anfänge liberaler Repräsentationskultur im Frankreich der Restaurationszeit 1814-1830, Der

Identificadores:  ISBN 9783486719383 (impreso)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

libros Acceso Abierto

Schauplätze und Themen der Umweltgeschichte-Umwelthistorische Miszellen aus dem Graduiertenkolleg ; Werkstattbericht

Identificadores:  ISBN 9783941875234 (impreso)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática

"Scenes and Topics of the History of Ecology" is the third workshop report presenting selected places of importance for the history of ecology, that can be recommended as travel destinations. Some topics could be attributed to a certain location only with great difficulties - if at all. For others there may be imaginary associations only. Therefore some essays and papers do not strictly adhere to the original intention. The volume continues the reports from the seminars, which are also intended to give outside observers a chance to stress their ecological consciousness. The reports may also serve as discussion material for similar seminars.
libros

Scheduling Algorithms

Peter Brucker
Identificadores:  ISBN 978-3-540-69515-8 (impreso) 978-3-540-69516-5 (en línea)

Accesos/Suscripciones

Este recurso está disponible en las siguientes plataformas

Cobertura temática