 |
|
|
|
|
 Guide to Computer Forensics and Investigations
The rapid advance of technology has changed and influenced how we think about gathering digital
evidence. Soon after the attacks on the World Trade Center in New York City on September 11,
2001, many young men and women volunteered to serve their country in different ways. For those
who did not choose the military, options included... |  |  Introduction to Embedded Systems: A Cyber-Physical Systems Approach
The most visible use of computers and software is processing information for human
consumption. We use them to write books (like this one), search for information
on the web, communicate via email, and keep track of financial data. The vast
majority of computers in use, however, are much less visible. They run the engine,
brakes,... |  |  Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the... |
|
| Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 |