Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Phishing: Cutting the Identity Theft Line
Phishing: Cutting the Identity Theft Line
Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,...

Understanding Criminology: Current Theoretical Debates (Crime and Justice)
Understanding Criminology: Current Theoretical Debates (Crime and Justice)
"Provides a very clear, easily readable introduction to the wide range of criminological theories.". Anne Rees, University of Portsmouth, UK
  • What does contemporary criminological theory look like? .
  • What impact, if any, does it have on policy?
The new edition of this
...
Managing Security Threats along the EU’s Eastern Flanks (New Security Challenges)
Managing Security Threats along the EU’s Eastern Flanks (New Security Challenges)

The book addresses security threats and challenges to the European Union emanating from its eastern neighbourhood. The volume includes the expertise of policy and scholarly contributors coming from North America, Russia and Central Asia, and from across the EU. Themes and issues include the EU’s capacities and actorness,...

Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Beyond Red and Blue: How Twelve Political Philosophies Shape American Debates
Beyond Red and Blue: How Twelve Political Philosophies Shape American Debates
On any given night cable TV news will tell us how polarized American politics is: Republicans are from Mars, Democrats are from Canada. But in fact, writes Peter Wenz in Beyond Red and Blue, Americans do not divide neatly into two ideological camps of red/blue, Republican/Democrat, right/left. If they did, what could explain Republicans...
Political Self-Sacrifice: Agency, Body and Emotion in International Relations (Cambridge Studies in International Relations)
Political Self-Sacrifice: Agency, Body and Emotion in International Relations (Cambridge Studies in International Relations)

Over the last decade the increasing phenomenon of suicide terrorism has raised questions about how it might be rational for individuals to engage in such acts. This book examines a range of different forms of political self-sacrifice, including hunger strikes, self-burning and non-violent martyrdom, all of which have taken place in resistance...

The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced...
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.

Readers will find the book...

 
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy