 |
|
 Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... |  |  Explosives and Chemical Weapons Identification (Forensic Science Techniques)I have thought long and hard about this book. This book was not created to make money. It was created to save lives — the lives of first responders and the people they have dedicated their lives to protect, the general public.
What is a first responder? It is a phrase often mentioned in the press but rarely defined.
... |  |  The Legal Protection of Databases: A Comparative AnalysisThis book examines and compares the several types of protection available for the protection of investment in database creation. The protection of investment in making databases is not harmonized internationally. In some countries, database contents are insufficiently protected and, in others, there is too much protection. While database producers... |
|
 |  |  Face Processing: Advanced Modeling and MethodsAs one of the most important applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past 10 years. There are at least two reasons for this trend: the first is the wide range of commercial and law-enforcement applications, and the second is the availability of feasible... |  |  |
|
 The Handbook of Information and Computer EthicsThis handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment;... |  |  20,000 Leagues under the Sea: Complete and UnabridgedFounded in 1906 by J.M. Dent, the Everyman Library has always tried to make the best books ever written available to the greatest number of people at the lowest possible price. Unique editorial features that help Everyman Paperback Classics stand out from the crowd include: a leading scholar or literary critic's introduction to the text,... |  |  Hackers: Heroes of the Computer RevolutionSteven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to... |
|
 Wireless Security: Know It AllThe latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and... |  |  |  |  Math You Can't Use: Patents, Copyright, and SoftwareThe field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means... |
|
| Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 |