Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Storage Forensics
Cloud Storage Forensics

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the...

Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)

Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing,...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Business Ethics: An Ethical Decision-Making Approach (Foundations of Business Ethics)
Business Ethics: An Ethical Decision-Making Approach (Foundations of Business Ethics)

Business Ethics: An Ethical Decision-Making Approach presents a practical decision-making framework to aid in the identification, understanding, and resolution of complex ethical dilemmas in the workplace.

  • Focuses exclusively on three basic aspects of ethical decision making and behavior—how it actually takes...
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
In the years since the bestselling first edition, fusion research and applications have adapted to service-oriented architectures and pushed the boundaries of situational modeling in human behavior, expanding into fields such as chemical and biological sensing, crisis management, and intelligent buildings.

Handbook of Multisensor Data...

Digital Convergence - Libraries of the Future
Digital Convergence - Libraries of the Future
Clay tablets have been used to keep records from the earliest times. However, they were used for archives rather than libraries and consisted mainly of administrative records.Private and personal libraries containing books first appeared in Greece in the 5th century BC.The Royal Library of Alexandria was founded in the 3rd century BC and was...
Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Analyzing the Analyzers: An Introspective Survey of Data Scientists and Their Work
Analyzing the Analyzers: An Introspective Survey of Data Scientists and Their Work

There has been intense excitement in recent years around activities labeled "data science," "big data," and "analytics." However, the lack of clarity around these terms and, particularly, around the skill sets and capabilities of their practitioners has led to inefficient communication between "data...

FSM-based Digital Design using Verilog HDL
FSM-based Digital Design using Verilog HDL

As digital circuit elements decrease in physical size, resulting in increasingly complex systems, a basic logic model that can be used in the control and design of a range of semiconductor devices is vital. Finite State Machines (FSM) have numerous advantages; they can be applied to many areas (including motor control, and signal and serial...

Compression Schemes for Mining Large Datasets: A Machine Learning Perspective
Compression Schemes for Mining Large Datasets: A Machine Learning Perspective

This book addresses the challenges of data abstraction generation using a least number of database scans, compressing data through novel lossy and non-lossy schemes, and carrying out clustering and classification directly in the compressed domain. Schemes are presented which are shown to be efficient both in terms of space and time, while...

Result Page: 33 32 31 30 29 28 27 26 25 24 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy