 |
|
 Crime and Punishment: Essential Primary SourcesCrime, and the issues that relate to it, arouse compelling curiosity and fervent debate. In the human psyche, crimes and their underlying motives often capture equal measures of fascination and revulsion. In the media, criminals are both condemned and granted celebrity. Accordingly, the readings and resources offered in Crime and Punishment:... |  |  The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured DataText mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced... |  |  |
|
 Cyber Warfare and Cyber Terrorism (Premier Reference)The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic... |  |  |  |  Systems Thinking: Coping with 21st Century Problems (Industrial Innovation)It is a great pleasure to introduce this inaugural edition of Systems Thinking: Coping with 21st Century Problems by John Boardman and Brian Sauser. In response to the increasing relevance of “systems thinking” to global challenges from terrorism to energy to clean water to healthcare, these authors provide a unique perspective on the... |
|
 |  |  Forensic Computer Crime InvestigationThe Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest... |  |  Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |