FCS Computer Programming L4
Author : Fahiemah Nash
Publisher : Pearson South Africa
Page : 372 pages
File Size : 27,84 MB
Release : 2009
Category : Computer programming
ISBN : 9781770253445
Author : Fahiemah Nash
Publisher : Pearson South Africa
Page : 372 pages
File Size : 27,84 MB
Release : 2009
Category : Computer programming
ISBN : 9781770253445
Author :
Publisher : Pearson South Africa
Page : 180 pages
File Size : 14,13 MB
Release : 2009
Category : Engineering
ISBN : 9781770254206
Author :
Publisher : Pearson South Africa
Page : 228 pages
File Size : 39,82 MB
Release : 2009
Category : Metal-work
ISBN : 9781770253766
Author :
Publisher : Pearson South Africa
Page : 276 pages
File Size : 21,15 MB
Release : 2009
Category : System analysis
ISBN : 9781770254282
Author :
Publisher : Pearson South Africa
Page : 308 pages
File Size : 29,71 MB
Release : 2009
Category : Business planning
ISBN : 9781770254169
Author :
Publisher : Pearson South Africa
Page : 354 pages
File Size : 11,25 MB
Release : 2009
Category : Computer networks
ISBN : 9781770253605
Author :
Publisher : Pearson South Africa
Page : 276 pages
File Size : 39,49 MB
Release : 2008
Category : Boilers
ISBN : 9781770253742
Author : Julia Pilbeam
Publisher : Pearson South Africa
Page : 188 pages
File Size : 20,78 MB
Release : 2009
Category : Digital electronics
ISBN : 9781770253728
Author : Bernita Naudé
Publisher : Pearson South Africa
Page : 396 pages
File Size : 16,81 MB
Release : 2009
Category : Communication
ISBN : 9781770253803
Author : Steven Branigan
Publisher : Addison-Wesley Professional
Page : 452 pages
File Size : 22,32 MB
Release : 2005
Category : Computers
ISBN :
With a target audience of computer security and other information technology professionals, Branigan (president, CyanLine LLC) focuses on the people more than the technology in his discussion of cybercrime and its investigation. He describes cases he's been involved with, some as a law enforcement officer, in order to give professionals an idea of how criminals exploit computer weaknesses and what can be done to catch them. After describing such episodes as an attack on a telephone network, an attack on an ISP, and a case of identity theft, he proceeds to a more general discussion of cybercrime, exploring such questions as why hackers hack and the proper conduct of criminal investigation.