|
|
|
|
Investigative Data Mining for Security and Criminal Detection, First EditionInvestigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest... | | | | Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and PracticeThe focused ion beam (FIB) instrument has experienced an intensive period of maturation since its inception. Numerous new techniques and applications have been brought to fruition by the tireless efforts of some very innovative scientists with the foresight to recognize the potential of this upstart apparatus. Over the past few years, the FIB has... |
|
Combating Spyware in the EnterpriseSpyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain... | | Hacking Exposed: Network Security Secrets & SolutionsIn today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz... | | Incident Response: Computer Forensics ToolkitYour in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks
Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer... |
|
Result Page: 21 20 19 18 17 16 15 14 13 12 |