Home | Amazing | Today | Tags | Publishers | Years | Search 
Deafness and Challenging Behaviour: The 360° Perspective
Deafness and Challenging Behaviour: The 360° Perspective

Challenging behaviours, such as aggression and violence, are more common in deaf people than hearing people. Filling a crucial gap in the international market, this book will appeal equally to those who work occasionally or entirely with Deaf or hearing impaired client groups of all ages.

Multi-disciplinary professionals with...

Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Open Source Software for Digital Forensics
Open Source Software for Digital Forensics

Open Source Applications
Springer Book Series
Editor: Ernesto Damiani, University of Milan, Italy
http://sesar.dti.unimi.it/ossbook/

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in...

Structural Investigation of Historic Buildings: A Case Study Guide to Preservation Technology for Buildings, Bridges, Towers and Mills
Structural Investigation of Historic Buildings: A Case Study Guide to Preservation Technology for Buildings, Bridges, Towers and Mills

A toolkit for giving our historic built environment a second life

Conservation of our existing structures has obvious economic and social value. Moreover, historic structures provide an excellent laboratory for studying aspects of structural engineering, materials science, forensic engineering, and building design. Structural...

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The...

Psychology and Law: Truthfulness, Accuracy and Credibility
Psychology and Law: Truthfulness, Accuracy and Credibility

How can psychology inform law and policing to help determine the accuracy of witnesses, victims and suspects?

This second edition of Psychology and Law: Truthfulness, Accuracy and Credibility is a substantially revised and exhaustive review of forensic research to do with credibility and the accuracy of evidence.

...

Scene of the Cybercrime: Computer Forensics Handbook
Scene of the Cybercrime: Computer Forensics Handbook

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and
...

Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence

In April 2005, I received a telephone call from Humana Press Senior Editor, Harvey Kane, inquiring whether there might be a need for a book to be published concerning the different aspects of computer forensics. During a subsequent meeting to discuss the current state of available texts covering this topic, I noted to Mr. Kane that there were...

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware,...

Crime Scene Photography, Second Edition
Crime Scene Photography, Second Edition

This textbook is designed for two principal photography student types. One group is the student in an academic setting. Students are expected to acquire a solid grasp of the theories and concepts of their various courses. This is the Knowledge point of the “KSAs” frequently required by employers. Students in an academic...

Food Chemical Risk Analysis (Food Science & Safety Series)
Food Chemical Risk Analysis (Food Science & Safety Series)

The recognition that chemicals in food, whatever their origin, might present a risk to the consumer has long been recognised. However, early food regulations at the beginning of the century were primarily aimed at prevention of adulteration and fraud rather than directed at consumer safety. It is only in the second half of the century...

The Facts on File Dictionary of Chemistry (Facts on File Science Dictionary)
The Facts on File Dictionary of Chemistry (Facts on File Science Dictionary)

This dictionary is one of a series designed for use in schools. It is intended for students of chemistry, but we hope that it will also be helpful to other science students and to anyone interested in science. Facts On File also publishes dictionaries in a variety of disciplines, including biology, physics, mathematics, forensic science,...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy