 |
|
|
 Psychology and Law: Truthfulness, Accuracy and Credibility
How can psychology inform law and policing to help determine the accuracy of witnesses, victims and suspects?
This second edition of Psychology and Law: Truthfulness, Accuracy and Credibility is a substantially revised and exhaustive review of forensic research to do with credibility and the accuracy of evidence.
... |  |  Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. Now, one of the world’s leading IT innovators explains what it all means—coherently, thoroughly, and authoritatively.
Writing for IT executives, architects, and developers... |  |  Prediction of Protein Structures, Functions, and Interactions
The growing flood of new experimental data generated by genome sequencing has provided an impetus for the development of automated methods for predicting the functions of proteins that have been deduced by sequence analysis and lack experimental characterization.
Prediction of Protein Structures, Functions and Interactions presents... |
|
 The People CMM: A Framework for Human Capital Management (2nd Edition)
Organizations are now competing in two markets, one for their products and services and one for the talent required to produce or perform them. Success in the former is determined by success in the latter. The ability to compete is directly related to the ability to attract, develop, motivate, organize, and retain the... |  |  |  |  Germs, Genes, & Civilization: How Epidemics Shaped Who We Are Today
“Clear, thoughtful, and thought-provoking, Germs, Genes & Civilization makes the case that infectious diseases have played a major role in shaping society. Clark argues that religion, morals, and even democracy have all been influenced by the smallest and most dangerous organisms on our planet. While... |
|
 Data Protection in a Profiled World
One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data... |  |  |  |  Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |
|
| Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 |