Amazon Price: N/A (as of April 2, 2015 02:28 –
International human rights law offers an overarching international legal framework to help determine the legality of the use of any weapon, as well as its lawful supply. It governs acts of States and non-State actors alike. In doing so, human rights law embraces international humanitarian law regulation of the use of weapons in armed conflict and disarmament law, as well as international criminal justice standards. In situations of law enforcement (such as counterpiracy, prisons, ordinary policing, riot control, and many peace operations), human rights law is the primary legal frame of reference above domestic criminal law. This important and timely book draws on all aspects of international weapons law and proposes a new view on international law governing weapons. Also included is a specific discussion on armed drones and cyberattacks, two highly topical issues in international law and international relations.
Amazon Price: N/A (as of April 1, 2015 19:14 –
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.
The book begins with the chapter â€œWhat is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions â€”the questions that have the power to divide this communityâ€” will also be examined in a comprehensive and thoughtful manner.
Amazon Price: $44.99 $30.38 You save: $14.61 (32%). (as of April 1, 2015 18:38 –
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.
Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.
Amazon Price: N/A (as of April 1, 2015 05:34 –
Amazon Price: N/A (as of April 2, 2015 01:29 –
The Ultimate Guide To Keep Your Internet Browsing Anonymous!
***Get this Amazon Best Seller now for the special promotion price of $2.99! Regularly priced at $3.99***