Electronic Books

Total Books: 41 - 59 /59
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Continue reading
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Continue reading
978-3-540-69304-8
Intelligence and Security Informatics : IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...

Continue reading
978-3-030-57024-8
Machine Intelligence and Big Data Analytics for Cybersecurity Applications

This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...

Continue reading
978-1-84628-253-9
Machine Learning and Data Mining for Computer Security

This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...

Continue reading
978-981-15-8183-0
Modes of Bio-Bordering The Hidden (Dis)integration of Europe

This book explores how biometric data is increasingly flowing across borders in order to limit, control and contain the ...

Continue reading
NoIMG
Multimedia Forensics

Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...

Continue reading
978-0-387-72367-9
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Continue reading
978-1-84628-090-0
Post Mortem Technique Handbook

Post Mortem Technique Handbook 2nd edition is a comprehensive practical guide to performing the modern post mortem. The text ...

Continue reading
1119154499
Practical Forensic Microscopy: A Laboratory Manual / Barbara P. Wheeler

Practical Forensic Microscopy: A Laboratory Manual, is a unique resource that brings the microscopic procedures used by real-world ...

Continue reading
978-0-387-25610-8
Psychological Knowledge in Court

PTSD, pain syndromes, traumatic brain injury: these three areas are common features of personal injury cases, often forming ...

Continue reading
978-88-470-0682-9
Radiological Reporting in Clinical Practice

Due to the diverse diagnostic imaging techniques available (X-ray/computed tomography, magnetic resonance, nuclear medicine, ...

Continue reading
978-3-031-12398-6
Recent Advances in Therapeutic Drug Monitoring and Clinical Toxicology / Seth Kwabena Amponsah, Yashwant V. Pathak

Covers forensic toxicology, nanotoxicology, toxicogenomics and toxinology. Discusses pharmacokinetics and pharmacogenomics Therapeutic ...

Continue reading
978-1-59745-316-5
Recovery, Analysis, and Identification of Commingled Human Remains

Mass fatality events can result in the intermixing, or commingling, of human remains. Commingling of human remains presents ...

Continue reading
978-1-60327-049-6
Serial Murder and the Psychology of Violent Crimes

The phenomena of serial violent crime has long plagued human civilizations. Far from being a contemporary notion unique to ...

Continue reading
NoIMG
The Winning Line

Engineering litigation rarely proceeds without some doubt in the case evidence. The settlement of this doubt requires the ...

Continue reading
978-3-030-18480-3
Theoretical and Practical Advances in Computer-based Educational Measurement

Presents a multitude of different, yet related, innovations in educational measurement and provides insight in their practical ...

Continue reading
978-3-540-49072-2
Transactions on Data Hiding and Multimedia Security I

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Continue reading
978-3-540-85933-8
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

Continue reading
Total Books: 41 - 59 /59