Logo

What If Crime Were Impossible?

Small book cover: What If Crime Were Impossible?

What If Crime Were Impossible?
by

Publisher: Univ. of Texas San Antonio
Number of pages: 303

Description:
Imagine societies with better planning, tighter control, more interference, and at the same time with openness and privacy. What if we made full use of computer technology, to enhance our security and our lives? Indeed, what if crime were impossible?

Home page url

Download or read it online for free here:
Download link
(1.1MB, PDF)

Similar books

Book cover: Security and Privacy: Global Standards for Ethical Identity ManagementSecurity and Privacy: Global Standards for Ethical Identity Management
by - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(9164 views)
Book cover: Protecting Children Online?: Cyberbullying Policies of Social Media CompaniesProtecting Children Online?: Cyberbullying Policies of Social Media Companies
by - The MIT Press
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.
(5389 views)
Book cover: Privacy on the Line: The Politics of Wiretapping and EncryptionPrivacy on the Line: The Politics of Wiretapping and Encryption
by - The MIT Press
An insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world. Authors strip away the hype surrounding the policy debate over privacy to examine the national security, commercial and civil liberties issues.
(5344 views)
Book cover: Underground: Tales of hacking, madness, and obsessionUnderground: Tales of hacking, madness, and obsession
by - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(15784 views)