الكتب الالكترونية

عدد الكتب: 41 - 59 /59
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

اقرأ المزيد
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

اقرأ المزيد
978-3-540-69304-8
Intelligence and Security Informatics : IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...

اقرأ المزيد
978-3-030-57024-8
Machine Intelligence and Big Data Analytics for Cybersecurity Applications

This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...

اقرأ المزيد
978-1-84628-253-9
Machine Learning and Data Mining for Computer Security

This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...

اقرأ المزيد
978-981-15-8183-0
Modes of Bio-Bordering The Hidden (Dis)integration of Europe

This book explores how biometric data is increasingly flowing across borders in order to limit, control and contain the ...

اقرأ المزيد
NoIMG
Multimedia Forensics

Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...

اقرأ المزيد
978-0-387-72367-9
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-1-84628-090-0
Post Mortem Technique Handbook

Post Mortem Technique Handbook 2nd edition is a comprehensive practical guide to performing the modern post mortem. The text ...

اقرأ المزيد
1119154499
Practical Forensic Microscopy: A Laboratory Manual / Barbara P. Wheeler

Practical Forensic Microscopy: A Laboratory Manual, is a unique resource that brings the microscopic procedures used by real-world ...

اقرأ المزيد
978-0-387-25610-8
Psychological Knowledge in Court

PTSD, pain syndromes, traumatic brain injury: these three areas are common features of personal injury cases, often forming ...

اقرأ المزيد
978-88-470-0682-9
Radiological Reporting in Clinical Practice

Due to the diverse diagnostic imaging techniques available (X-ray/computed tomography, magnetic resonance, nuclear medicine, ...

اقرأ المزيد
978-3-031-12398-6
Recent Advances in Therapeutic Drug Monitoring and Clinical Toxicology / Seth Kwabena Amponsah, Yashwant V. Pathak

Covers forensic toxicology, nanotoxicology, toxicogenomics and toxinology. Discusses pharmacokinetics and pharmacogenomics Therapeutic ...

اقرأ المزيد
978-1-59745-316-5
Recovery, Analysis, and Identification of Commingled Human Remains

Mass fatality events can result in the intermixing, or commingling, of human remains. Commingling of human remains presents ...

اقرأ المزيد
978-1-60327-049-6
Serial Murder and the Psychology of Violent Crimes

The phenomena of serial violent crime has long plagued human civilizations. Far from being a contemporary notion unique to ...

اقرأ المزيد
NoIMG
The Winning Line

Engineering litigation rarely proceeds without some doubt in the case evidence. The settlement of this doubt requires the ...

اقرأ المزيد
978-3-030-18480-3
Theoretical and Practical Advances in Computer-based Educational Measurement

Presents a multitude of different, yet related, innovations in educational measurement and provides insight in their practical ...

اقرأ المزيد
978-3-540-49072-2
Transactions on Data Hiding and Multimedia Security I

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

اقرأ المزيد
978-3-540-85933-8
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

اقرأ المزيد
عدد الكتب: 41 - 59 /59