Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Brain Mapping: The Methods, Second Edition (Toga, Brain Mapping)
Brain Mapping: The Methods, Second Edition (Toga, Brain Mapping)

Investigation of the functional architecture of the human brain using modern noninvasive imaging techniques is a rapidly expanding area of research. A proper knowledge of methodology is needed to appreciate the burgeoning literature in the field. This timely publication provides an excellent catalogue of the main techniques.

...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Innovation and Entrepreneurship: Powerful Tools for a Modern Knowledge-Based Economy (SpringerBriefs in Business)
Innovation and Entrepreneurship: Powerful Tools for a Modern Knowledge-Based Economy (SpringerBriefs in Business)

In this book, Hanadi Mubarak, Ali Husain and Michael promote the concept of innovation incubators from a business-management perspective. The book provides a comprehensive roadmap for the development of new economies based on technology, as well as value added in technology transfer, innovation development and an entrepreneurial climate.

...
Rape Investigation Handbook
Rape Investigation Handbook
"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com

An unprecedented collaborative work -- the first
...
Molecular Computation Models: Unconventional Approaches
Molecular Computation Models: Unconventional Approaches
With the increasing complexity of software systems and their widespread growth into many aspects of our lives, the need to search for new models, paradigms, and ultimately, technologies, to manage this problem is evident. The way nature solves various problems through processes evolving during billions of years was always an inspiration to many...
Handbook on Business Information Systems
Handbook on Business Information Systems

This handbook covers the vast field of business information systems, focusing particularly on developing information systems to capture and integrate information technology together with the people and their businesses.

Part I of the book, Health Care Information Systems , focuses on providing global leadership for the optimal use...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...

Scientific Investigation of Copies, Fakes and Forgeries
Scientific Investigation of Copies, Fakes and Forgeries

The faking and forgery of works of art and antiquities is probably now more extensive than ever before. The frauds are aided by new technologies, from ink jet printers to epoxy resins, and driven by the astronomic prices realised on the global market.

This book aims to provide a comprehensive survey of the subject over a wide
...

Damage and Interfacial Debonding in Composites (Studies in Applied Mechanics)
Damage and Interfacial Debonding in Composites (Studies in Applied Mechanics)

This book represents thirteen papers that are based on the presentations made in the five session symposium on "Damage and Interfacial Debonding in Composites" on the occasion of the 32nd Society of Engineering Science Meeting; held in New Orleans, Louisiana, October 29 - November 1, 1995. The five sessions were mainly in the...

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Creating Belonging in San Francisco Chinatown’s Diasporic Community: Morphosyntactic Aspects of Indexing Ethnic Identity
Creating Belonging in San Francisco Chinatown’s Diasporic Community: Morphosyntactic Aspects of Indexing Ethnic Identity

This book presents a much-needed discussion on ethnic identification and morphosyntactic variation in San Francisco Chinatown?a community that has received very little attention in linguistic research. An investigation of original, interactive speech data sheds light on how first- and second-generation Chinese Americans...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy