Listing 1 - 10 of 43 | << page >> |
Sort by
|
Choose an application
Written by leading experts in the field, this timely collection highlights current strategies and thinking in relation to prevention of sexual violence and critically considers the limitations of these frameworks. Combining psychological, criminological, sociological and legal perspectives, it explores academic, practitioner and survivor points of view. It addresses broad themes, from cultures of sexual harassment to the role of media in oversexualising women and girls, as well as specific issues including violence against children and older people. For researchers, practitioners and students alike, this is an invaluable resource that maps new approaches for practice and prevention.
Sex crimes --- Prevention. --- Prevention --- Sex crimes ; Prevention.
Choose an application
No single invention of the last half century has changed the way we live now as much as the Internet. The author was a member of the generation for whom it was a utopian ideal turned reality : a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn't so bright any more : increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. The author explains why we underestimate the consequences of states' ambitions to project power in cyberspace at our peril : Not only have hacking and cyber operations fundamentally changed the nature of political conflict - ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war - but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today - and with it the very existence of open and democratic societies. Blending anecdote with argument, the author brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War - and quite possibly as dangerous for humanity as a whole.
Choose an application
In the two-and-a-half decades since the end of the Cold War, policy makers have become acutely aware of the extent to which the world today faces mass atrocities. In an effort to prevent the death, destruction and global chaos wrought by these crimes, the agendas for both national and international policy have grown beyond conflict prevention to encompass atrocity prevention, protection of civilians, transitional justice and the responsibility to protect. Yet, to date, there has been no attempt to address the topic of the prevention of mass atrocities from the theoretical, policy and practicing standpoints simultaneously. This volume is designed to fill that gap, clarifying and solidifying the present understanding of atrocity prevention. It will serve as an authoritative work on the state of the field.
Atrocities -- Prevention. --- Genocide -- Prevention. --- War crimes -- Prevention. --- Atrocities --- War crimes --- Genocide --- Prevention. --- Crime --- Military atrocities --- Cruelty
Choose an application
The United States military now views cyberspace as the 'fifth domain' of warfare, alongside land, air, sea, and space. The Pentagon, the National Security Agency, and the CIA field teams of hackers who launch cyber strikes against enemy targets - and amass staggering quantities of personal information on all of us. These same virtual warriors, along with a growing band of private-sector counterparts, are charged with defending us against the vast array of criminals, terrorists, and foreign governments who attack us with ever-increasing frequency and effectiveness. The author infiltrates the frontlines of this fifth domain, explaining how and why government agencies are joining with tech giants like Google and Microsoft to collect huge amounts of information and launch private cyber wars. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and the author offers a penetrating and unnerving view of this partnership. Finally, he details the welter of opportunities and threats that the mushrooming 'military-Internet complex' poses for our personal freedoms, our economic security, and the future of our nation.
Choose an application
Choose an application
This book illustrates current cyber laundering practices and the underlying risks associated with them, such as cross-border crimes and terrorism financing. Despite the existence of international regulations and strong worldwide cooperation, countermeasures and international response efforts are often hindered by enforcement and jurisdictional issues, as well as online asset recovery complexity. This work investigates the blockages to the accomplishment of cyber laundering regulation and enforcement at the international level. It provides strong legal recommendations for fostering the construction of more efficient means of implementation.
Choose an application
Criminology. Victimology --- Criminal justice, Administration of --- Violent crimes --- Prevention --- Criminal justice, Administration of. --- Prevention. --- Violent crimes - Prevention --- Criminal justice, Administration of - Ohio - Columbus --- Violent crimes - Ohio - Columbus - Prevention
Choose an application
diefstal --- Hygiene. Public health. Protection --- misdaadpreventie --- inbraak --- brandpreventie --- 12.01 --- 12.03 --- Preventie ; Algemeen --- Preventie ; Diefstal ; Fraude --- Crimes. Prévention. --- Misdrijven. Voorkoming.
Choose an application
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile
Choose an application
Crime [Prévention du ] --- Crime prevention --- Crime--Prevention --- Crimes--Prévention --- Délinquance--Prévention --- Misdaadpreventie --- Misdaden--Preventie --- Prevention of crime --- Prévention de la criminalité --- Prévention de la délinquance --- Prévention du crime --- -Crime --- Public safety --- Congresses --- Prevention --- Government policy --- Congresses. --- -Congresses --- Planning
Listing 1 - 10 of 43 | << page >> |
Sort by
|