Investigation of the functional architecture of the human brain using modern noninvasive imaging techniques is a rapidly expanding area of research. A proper knowledge of methodology is needed to appreciate the burgeoning literature in the field. This timely publication provides an excellent catalogue of the main techniques.
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...
In this book, Hanadi Mubarak, Ali Husain and Michael promote the concept of innovation incubators from a business-management perspective. The book provides a comprehensive roadmap for the development of new economies based on technology, as well as value added in technology transfer, innovation development and an entrepreneurial climate.
"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com
An unprecedented collaborative work -- the first...
With the increasing complexity of software systems and their widespread growth into many aspects of our lives, the need to search for new models, paradigms, and ultimately, technologies, to manage this problem is evident. The way nature solves various problems through processes evolving during billions of years was always an inspiration to many...
This handbook covers the vast field of business information systems, focusing particularly on developing information systems to capture and integrate information technology together with the people and their businesses.
Part I of the book, Health Care Information Systems , focuses on providing global leadership for the optimal use...
The Android mobile platform has quickly risen from its first phone in October 2008
to the most popular mobile operating system in the world by early 2011. The
explosive growth of the platform has been a significant win for consumers with
respect to competition and features. However, forensic analysts and security engineers
have...
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...
The faking and forgery of works of art and antiquities is probably now more extensive than ever before. The frauds are aided by new technologies, from ink jet printers to epoxy resins, and driven by the astronomic prices realised on the global market.
This book aims to provide a comprehensive survey of the subject over a wide...
This book represents thirteen papers that are based on the presentations made in the five
session symposium on "Damage and Interfacial Debonding in Composites" on the occasion
of the 32nd Society of Engineering Science Meeting; held in New Orleans, Louisiana,
October 29 - November 1, 1995. The five sessions were mainly in the...
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...
This book presents a much-needed discussion on ethnic identification and morphosyntactic variation in San Francisco Chinatown?a community that has received very little attention in linguistic research. An investigation of original, interactive speech data sheds light on how first- and second-generation Chinese Americans...