Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Forensic psychology 210
- Psicología 186
- Psychology 181
- Psicología legal 180
- Computer security 165
- Security measures 154
- Medicina legal 136
- Computer networks 121
- Computer crimes 107
- Derecho 96
- Investigation 88
- Psiquiatría forense 81
- Psicología forense 80
- Forensic sciences 79
- Derecho procesal 72
- Anuarios 70
- Oratoria forense 58
- Derecho Civil 41
- Examinations 38
- Medical jurisprudence 38
- Law 34
- Criminología 33
- Derecho civil 33
- Práctica forense 33
- Psicología criminal 32
- Historia 30
- Forensic Medicine 29
- Psychological aspects 29
- Criminal investigation 28
- Abogados 27
-
3021Publicado 2012“…This book includes helpful tools and checklists to help you address: - Visual, digital, and auditory data security - Payment card industry (PCI) compliance, password management, and social engineering - User authentication methods - Computer and network forensics - Physical security and continuity planning - Privacy concerns and privacy-related regulation This concise security management primer facilitates the up-to-date understanding required to protect your digital and physical assets, including customer data, networking equipment, and employee information. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3022por Wilson, Larry“…Sometimes this is based on the investigation and forensic evidence, and often times on just a gut feeling or intuition. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3023Publicado 2021“…Aplicando esta metodología en diferentes áreas de conocimiento de la educación superior: marketing, derecho, ciencia y tecnología de los alimentos, periodismo, ciencias forenses, farmacia, y diversas ingenierías…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3024por Sullivan, Kevin. author“…He traces the dynamic interplay among employees, regulatory examiners, compliance officers, fraud and forensic accountants and technologists, criminal investigators, and prosecutors in following up on reports, catching launderers, and protecting the integrity and reputations of financial institutions and businesses. …”
Publicado 2015
Libro electrónico -
3025Publicado 2023“…Using the latest version of Debian, you’ll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. …”
Libro electrónico -
3026Publicado 2019“…The submitted papers content original ideas and papers describing results and developments from both researchers and practitioners in fields addressing directions in the following interdisciplinary topics: Networking, Information Systems & Intelligence, Security and Digital Forensics. NISS19 attracted a good number of high-quality submissions: the overall acceptance rate for full papers was around 44%. …”
Libro electrónico -
3027Publicado 2012“…"All the tools needed to perform a thorough risk assessment-whether you're working in insurance, forensics, engineering, or public safetyRisk analysis is the method of analyzing the dangers to individuals, businesses, and government agencies posed by potential natural and man-made hazards. …”
Libro electrónico -
3028Publicado 2012“…Managing Fraud Risk shows you where to look for fraud, setting out a route-map for finding and fighting fraud risks in your business, with the practical, strategic advice you need.Combining the latest theory with forensic risk analysis, this book reveals how you can provide assurance to your Board and stakeholders. …”
Libro electrónico -
3029Publicado 2016“…Understand intrusion detection: Its meaning, its value, and how to implement it Master the workings of host-based and network-based intrusion detection systems Learn about network captures, cryptographic hashes, alerting, incident response, and more Gain awareness of anomaly based and signature based intrusion detection systems Learn to use open source intrusion detection systems like Snort, Suricata, and Bro Understand how to perform file integrity checks using Tripwire and Samhain Review multiple forms of built-into-the-OS IDS systems Ric Messier directs the Cybersecurity & Digital Forensics program at Champlain College in Burlington, VT. …”
-
3030por Gold, Liza H., 1958-“…Key features of the book: A robust assessment model of psychological disability in the workplace Practice guidelines for conducting workplace mental health disability evaluations Legal and ethical aspects of employment evaluations, especially as they differ from clinical procedure Examination of the process of the development of psychiatric disability Issues specific to evaluations for Social Security, Workers’ Compensation, and other disability benefit programs Issues specific to evaluations for the Americans with Disabilities Act and Fitness-For-Duty evaluations Review of relevant administrative and case law As an introduction to these complex issues or for the further improvement of evaluation skills, Evaluating Mental Health Disability in the Workplace is a timely reference for psychiatrists, psychologists, forensic mental health specialists, and attorneys in this field…”
Publicado 2009
Libro electrónico -
3031Publicado 2022“…With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field.The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. …”
Libro electrónico -
3032por Redondo, Dolores, 1969-“…Pero serán los análisis forenses del doctor San Martín los que convencen a la inspectora Amaia Salazar de investigar otras muertes de bebés, que pronto revelarán un rastro inaudito en el valle. …”
Publicado 2016
Biblioteca Universidad de Deusto (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro -
3033por Casals Campos, Esperanza“…"En el ámbito de las separaciones conflictivas y las luchas por la custodia de los hijos, los psicólogos forenses reciben cada vez más encargos para realizar informes de familia en los que ambos progenitores se acusan cruzadamente de estos dos procesos: abuso sexual -y/o malos tratos- y manipulación emocional al hijo o hija en su contra por parte del otro progenitor. …”
Publicado 2013
Libro -
3034Publicado 2024“…L’arte retorica, o «della persuasione», occupa la scena nell’ultimo capitolo, dedicato a una delle manifestazioni qualificanti dell’oratoria forense: l’arringa. Gli esempi proposti, tratti da raccolte scritte, vengono ad aggiungersi al ricco corpus di testi preso in esame nei capitoli precedenti --…”
Libro -
3035
-
3036
-
3037Publicado 2023“…Vulnerability analysis and digital forensics are examined, readying you for both proactive and reactive cybersecurity roles. …”
Video -
3038Publicado 2011“…Next, he discusses new ways to measure the technology economy--including “forensic” techniques for detecting emerging shifts, new opportunities, and areas of underperformance. …”
-
3039Publicado 2011“….” — Capers Jones, President, Capers Jones & Associates LLC “Bob has done a fantastic job making computer science forensics understandable to attorneys, engineers, and managers. …”
Libro electrónico -
3040Publicado 2004“…The Ministry therefore commissioned a systematic review of the scientific evidence from a group of medical doctors with experience in forensic medicine, substance abuse, anti-doping work and health technology assessment. …”
Libro electrónico