Logo

What If Crime Were Impossible?

Small book cover: What If Crime Were Impossible?

What If Crime Were Impossible?
by

Publisher: Univ. of Texas San Antonio
Number of pages: 303

Description:
Imagine societies with better planning, tighter control, more interference, and at the same time with openness and privacy. What if we made full use of computer technology, to enhance our security and our lives? Indeed, what if crime were impossible?

Home page url

Download or read it online for free here:
Download link
(1.1MB, PDF)

Similar books

Book cover: The Transnational Dimension of Cyber Crime and TerrorismThe Transnational Dimension of Cyber Crime and Terrorism
by - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(7829 views)
Book cover: Privacy on the Line: The Politics of Wiretapping and EncryptionPrivacy on the Line: The Politics of Wiretapping and Encryption
by - The MIT Press
An insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world. Authors strip away the hype surrounding the policy debate over privacy to examine the national security, commercial and civil liberties issues.
(573 views)
Book cover: Protecting Children Online?: Cyberbullying Policies of Social Media CompaniesProtecting Children Online?: Cyberbullying Policies of Social Media Companies
by - The MIT Press
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.
(632 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(11682 views)