Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Principles of Data Mining (Undergraduate Topics in Computer Science)
Principles of Data Mining (Undergraduate Topics in Computer Science)

Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each...

Python Forensics: A workbench for inventing and sharing digital forensic technology
Python Forensics: A workbench for inventing and sharing digital forensic technology

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build...

Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Clinical Forensic Medicine: A Physician's Guide (Forensic Science and Medicine)
Clinical Forensic Medicine: A Physician's Guide (Forensic Science and Medicine)

This revised edition has been completely updated and expanded to address the latest developments and professional concerns in forensic medicine. There are new chapters on the medical aspects of police restraint and new material on the potential of police exposure to infection, the role of alcohol and drugs in vehicular accidents, and forensic...

Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Explosives and Chemical Weapons Identification (Forensic Science Techniques)
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
I have thought long and hard about this book. This book was not created to make money. It was created to save lives — the lives of first responders and the people they have dedicated their lives to protect, the general public.

What is a first responder? It is a phrase often mentioned in the press but rarely defined.
...
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Analytical Techniques in the Sciences

This series of books provides coverage of all of the major analytical techniques and their application in the most important areas of physical, life and materials science. Each text is presented in an open learning/distance learning style, in which the learning objectives are clearly identified. The...

Forensic Pathology of Trauma (Forensic Science and Medicine)
Forensic Pathology of Trauma (Forensic Science and Medicine)
The practice of forensic pathology includes the collection and analysis of evidence in relation to a corpse in order to establish the cause of death. Knowledge of the cause of death contributes to the determination of the manner of death by medical examiners and coroners, who are occasionally assisted by law enforcement officers. In...
Introduction to Forensic Sciences, Second Edition
Introduction to Forensic Sciences, Second Edition
This work is dedicated to students at all levels of education, who are interested
in the fascinating field of forensic science. The contents of this book, by
outstanding contributors, provides the reader with information on the various
fields of forensic science that may help them make a career choice or
add to their present
...
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Our aim with this book was to place, under the same roof, two distinct but intertwined aspects of the use of fingerprinting for personal identification and criminal investigation: (1) the aspects associated with the visualization, detection, and recording of friction ridge skin impressions and (2) the issues regarding the identification or...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy