|
|
|
|
|
|
Biometrics: Identity Verification in a Networked WorldAn in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment
No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce... | | Investigative Data Mining for Security and Criminal Detection, First EditionInvestigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest... | | |
|
Superstition: Belief in the Age of ScienceFrom uttering a prayer before boarding a plane, to exploring past lives through hypnosis, has superstition become pervasive in contemporary culture? Robert Park, the best-selling author of Voodoo Science, argues that it has. In Superstition, Park asks why people persist in superstitious convictions long after science has shown... | | Creative Evolutionary Systems (With CD-ROM)This volume shows the current state of the art, and the science, of evolutionary creativity. It shows what can--and equally important, what can't--be done at the turn of the new millennium. What will have been achieved by the turn of the next one is anyone's guess. Meanwhile, it's intriguing, it's instructive, it's difficult, and it's fun!... | | Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |