Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Internet Fraud Casebook: The World Wide Web of Deceit
Internet Fraud Casebook: The World Wide Web of Deceit

Real case studies on Internet fraud written by real fraud examiners

Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive,...

Heuristics in Analytics: A Practical Perspective of What Influences Our Analytical World (Wiley and SAS Business Series)
Heuristics in Analytics: A Practical Perspective of What Influences Our Analytical World (Wiley and SAS Business Series)

Employ heuristic adjustments for truly accurate analysis

Heuristics in Analytics presents an approach to analysis that accounts for the randomness of business and the competitive marketplace, creating a model that more accurately reflects the scenario at hand. With an emphasis on the importance of proper analytical...

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself
Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself

"Sloan's easy and informative writing makes for a thoroughly worthwhile update."--BARRON’S

"A useful corrective to the view of short selling as 'unpatriotic' or uniquely anti-social."--John Plender, Financial Times, November 16, 2009

"I liked this...

Essentials of Online payment Security and Fraud Prevention (Essentials Series)
Essentials of Online payment Security and Fraud Prevention (Essentials Series)

Doing business online is no longer an oddity, but the norm, and companies desiring to remain competitive have to maintain some form of online presence. Doing business online means a company has to be able to efficiently, reliably, and securely take payments from consumers and other merchants. This book is written to provide the...

Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World

An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment

No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...

Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest...
Artificial Intelligence: A Systems Approach (w/CDROM)(Computer Science) (Engineering)
Artificial Intelligence: A Systems Approach (w/CDROM)(Computer Science) (Engineering)
The history of AI is interesting all by itself. It’s a modern-day drama, filled with excitement and anticipation, discovery, and disappointment. From over-promises of early (and later) AI research, to fears of the unknown from the general public, AI’s history is worthy of study by itself. In this chapter, we’ll explore AI’s...
Superstition: Belief in the Age of Science
Superstition: Belief in the Age of Science
From uttering a prayer before boarding a plane, to exploring past lives through hypnosis, has superstition become pervasive in contemporary culture? Robert Park, the best-selling author of Voodoo Science, argues that it has. In Superstition, Park asks why people persist in superstitious convictions long after science has shown...
Creative Evolutionary Systems (With CD-ROM)
Creative Evolutionary Systems (With CD-ROM)
This volume shows the current state of the art, and the science, of evolutionary creativity. It shows what can--and equally important, what can't--be done at the turn of the new millennium. What will have been achieved by the turn of the next one is anyone's guess. Meanwhile, it's intriguing, it's instructive, it's difficult, and it's fun!...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy