Home | Amazing | Today | Tags | Publishers | Years | Search 
Poisoning & Drug Overdose (Lange Clinical Manual)
Poisoning & Drug Overdose (Lange Clinical Manual)
This is the leading manual on the diagnosis and treatment of poisoning and drug overdose, including chemical and occupational exposures.

Univ. of California, San Francisco. Quick-reference pocket manual for practitioners in emergency settings. Outline format and thumb tabbed. Previous edition: c1994. Wire-spiral binding.
...
Digital Document Processing: Major Directions and Recent Advances (Advances in Pattern Recognition)
Digital Document Processing: Major Directions and Recent Advances (Advances in Pattern Recognition)
In this book, all the major and frontier topics in the field of document analysis are brought together into a single volume creating a unique reference source.

Highlights include:

- Document structure analysis followed by OCR of Japanese, Tibetan and Indian printed scripts.

- Online and offline handwritten text recognition...

Managing the Audit Function: A Corporate Audit Department Procedures Guide
Managing the Audit Function: A Corporate Audit Department Procedures Guide

As auditing shifts from an outsourced function to a cornerstone of internal control, audit directors need an updated manual that reflects the radical changes the internal audit profession recently experienced in order to establish efficient processes for conducting successful audits. Managing the Audit Function, Third Edition, provides...

The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition
The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition
Pass the CISSP and ISSEP exams with this new edition of the bestselling prep guide!

The U.S. government has mandated that all contractors–nearly all current CISSPs, and those yet to be certified as CISSPs–attain the security engineering subject certification Information Systems Security Engineering Professional (ISSEP). The ISSEP...

Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
The popularity of multimedia content has led to the widespread distribution and consumption of digital multimedia data. As a result of the relative ease with which individuals may now alter and repackage digital content, ensuring that media content is employed by authorized users for its intended purpose is becoming an issue of eminent importance...
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Police work deals with human nature, which is always changing and, therefore, constantly poses new challenges for the law enforcement officer. The skills learned in basic police training are just that — basic. Officers must seek continual training to keep up with their criminal counterparts.

The investigation of crimes such as
...
Practical Aspects of Interview and Interrogation-Soft Cover
Practical Aspects of Interview and Interrogation-Soft Cover
What makes a person confess to a crime he did not commit? Was he coerced? Is he trying to protect someone else? Interrogation has come under attack as opponents focus on false confessions. However, most cases are still resolved by confession, not forensic evidence. Among the new topics covered in the Second Edition of this bestselling book,...
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

The Facts On File Dictionary Of Mathematics (Facts on File Science Library)
The Facts On File Dictionary Of Mathematics (Facts on File Science Library)
This dictionary is one of a series designed for use in schools. It is intended for students of mathematics, but we hope that it will also be helpful to other science students and to anyone interested in science. Facts On File also publishes dictionaries in a variety of disciplines, including biology, chemistry, forensic science, marine science,...
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)

Why do people lie?

Do gender and personality differences affect how people lie?

How can lies be detected?

Detecting Lies and Deceit provides the most comprehensive review of deception to date. This revised edition provides an up-to-date...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy