|
|
|
|
|
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community ... | | Computer Security Fundamentals (2nd Edition)
It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.
The real question is who is this book for. This book is... | | Stealing the Network: How to Own a ContinentThis book outlines a fictional plot to "own the box" by compromising an entire continent's network infrastructure. It combines a set of stories with real technology to show readers the danger that lurks in the shadows of the information security industry.
The first book in this series ... |
|
Unsolved Crimes (Criminal Investigations)In "Unsolved Crimes", famous, unresolved cases from the past 120 years are examined to review what police and experts in forensic science did (or failed to do) while trying to resolve each crime. For each case covered, the key theories and suspects are described. Though technology is much improved since the time of Jack the Ripper in... | | Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... | | |
|
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |