"Tells the stories of those who suffered during the worst social and political failure in the continent's history-the War on Drugs-and what we can do to right the wrongs of the past"--OCLC-licensed vendor bibliographic record.
"This book provides a paradigm changing approach for protecting organizational email users from falling prey to social engineering"--OCLC-licensed vendor bibliographic record.
"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--OCLC-licensed vendor bibliographic record.
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach--the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump--makes headlines, in…
In this book, the author argues that in embarking on an unprecedented effort to build surveillance capabilities deeply into communications infrastructure, the U.S. government is opting for short-term security and creating dangerous long-term risks. Landau describes what makes communications security hard, warrantless wiretapping and the role of electronic surveillance in the war on terror, the …
We live in a society that is increasingly preoccupied with allocating blame: when something goes wrong someone must be to blame. Bringing together philosophical, psychological, and sociological accounts of blame, this is the first detailed criminological account of the role of blame in which the authors present a novel study of the legal process of blame attribution, set in the context of crimi…
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an…
Challenging popular misconceptions of female users, this book is the first to examine how female drug user's identities, and hence their experiences, are shaped by drug policies.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…
This book is volume two of the writings of David Sissons, who first established his academic career as a political scientist specialising in Japanese politics, and later shifted his focus to the history of Australia–Japan relations. In this volume, we reproduce his writings on Japanese politics, the Pacific War and Australian war crimes trials after the war. He was a pioneer in these fields, …