Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Evidence and Computer Crime, Second Edition
Digital Evidence and Computer Crime, Second Edition

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.

Though an...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
Terrorism: The Basics
Terrorism: The Basics

Terrorism: The Basics is an ideal starting point for anyone interested in one of the most discussed, written about and analysed aspects of modern life. Common misconceptions are dispelled as the authors provide clear and jargon-free answers to the big questions:

  • What does terrorism involve?
  • ...
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications

This publication offers and investigates efficient Monte Carlo simulation methods in order to realize a Bayesian approach to approximate learning of Bayesian networks from both complete and incomplete data. For large amounts of incomplete data when Monte Carlo methods are inefficient, approximations are implemented, such that learning remains...

Systems Thinking: Coping with 21st Century Problems (Industrial Innovation)
Systems Thinking: Coping with 21st Century Problems (Industrial Innovation)
It is a great pleasure to introduce this inaugural edition of Systems Thinking: Coping with 21st Century Problems by John Boardman and Brian Sauser. In response to the increasing relevance of “systems thinking” to global challenges from terrorism to energy to clean water to healthcare, these authors provide a unique perspective on the...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Immediately following the events of September 11, 2001, the National Academies (including the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council) offered its services to the nation to formulate a scientific and technological response to the challenges posed by emerging...
Parallel Computing: Architectures, Algorithms and Applications - Volume 15 Advances in Parallel Computing
Parallel Computing: Architectures, Algorithms and Applications - Volume 15 Advances in Parallel Computing

ParCo2007 marks a quarter of a century of the international conferences on parallel computing that started in Berlin in 1983. The aim of the conference is to give an overview of the state-of-the-art of the developments, applications and future trends in high performance computing for all platforms. The conference addresses all aspects of...

Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
Learning from Catastrophes: Strategies for Reaction and Response
Learning from Catastrophes: Strategies for Reaction and Response

Breakthrough Best Practices for Managing Extreme Risks–Both Natural and Man-Made

  • How to prepare for risks ranging from financial crises and climate change to pandemics and terrorism
  • Indispensable...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy