Home | Amazing | Today | Tags | Publishers | Years | Search 
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Criminology For Dummies
Criminology For Dummies

Your thorough guide to comprehending and combating crime

Are you fascinated by criminology, forensics, and detective work? This you-are-there guide takes you deep into the world of crime, giving you a better understanding of the dark recesses of the criminal mind and how law enforcement officials investigate crime. You'll gain real-world...

Performance Politics and the British Voter
Performance Politics and the British Voter
What matters most to voters when they choose their leaders? This book suggests that performance politics is at the heart of contemporary democracy, with voters forming judgments about how well competing parties and leaders perform on important issues. Given the high stakes and uncertainty involved, voters rely heavily on partisan cues and party...
Advances in Artificial Intelligence for Privacy Protection and Security
Advances in Artificial Intelligence for Privacy Protection and Security

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,...

Advances in Ambient Intelligence: Volume 164 Frontiers in Artificial Intelligence and Applications
Advances in Ambient Intelligence: Volume 164 Frontiers in Artificial Intelligence and Applications

Ambient Intelligence lies at the confluence of several trends: the continued decrease in cost and size of computing technology; the increasing availability of networking and communication infrastructure; the growing public familiarity/comfort with computing artifacts; and practical advances in artificial intelligence. These developments make...

Parallel Computing: Architectures, Algorithms and Applications - Volume 15 Advances in Parallel Computing
Parallel Computing: Architectures, Algorithms and Applications - Volume 15 Advances in Parallel Computing

ParCo2007 marks a quarter of a century of the international conferences on parallel computing that started in Berlin in 1983. The aim of the conference is to give an overview of the state-of-the-art of the developments, applications and future trends in high performance computing for all platforms. The conference addresses all aspects of...

Introduction to Security, Eighth Edition
Introduction to Security, Eighth Edition

Introduction to Security, 8th Edition, has been the leading introduction to private security for over thirty years, celebrated for its balanced and professional approach to this increasingly important area. Now the eighth edition expands the key topics and adds material on important issues in the 21st c environment.

...

Scene of the Cybercrime: Computer Forensics Handbook
Scene of the Cybercrime: Computer Forensics Handbook

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and
...

Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy