Essentials of Online payment Security and Fraud Prevention (Essentials Series)
Doing business online is no longer an oddity, but the norm, and
companies desiring to remain competitive have to maintain
some form of online presence. Doing business online means a
company has to be able to efficiently, reliably, and securely take payments
from consumers and other merchants. This book is written to
Biometrics: Identity Verification in a Networked World
An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment
No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...
Investigative Data Mining for Security and Criminal Detection, First Edition Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest... Superstition: Belief in the Age of Science From uttering a prayer before boarding a plane, to exploring past lives through hypnosis, has superstition become pervasive in contemporary culture? Robert Park, the best-selling author of Voodoo Science, argues that it has. In Superstition, Park asks why people persist in superstitious convictions long after science has shown...
Creative Evolutionary Systems (With CD-ROM) This volume shows the current state of the art, and the science, of evolutionary creativity. It shows what can--and equally important, what can't--be done at the turn of the new millennium. What will have been achieved by the turn of the next one is anyone's guess. Meanwhile, it's intriguing, it's instructive, it's difficult, and it's fun!... Mastering Windows Network Forensics and Investigation
Conduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this...
Formal Correctness of Security Protocols (Information Security and Cryptography) Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.
The author investigates proofs of correctness of realistic security protocols in...
|Result Page: 11 10 9 8 7 6 5 4 3 2 1 |