Forensic Handwriting Identification: Fundamental Concepts and Principles teaches the law enforcement and legal communities the major principles involved in handwriting and hand-printing analysis as applied to many types of investigations, including fraud, homicide, suicide, drug trafficking/clandestine labs, sexual offenses, threats and extortion, blackmail, arson, bombings, and theft.
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively.
Cell Phone Location Evidence for Legal Professionals: Understanding Cell Phone Location Evidence from the Warrant to the Courtroom is a guide, in plain language, for digital forensics professionals, attorneys, law enforcement professionals and students interested in the sources, methods and evidence used to perform forensic data analysis of cell phones, call detail records, real time ping records and geo-location data obtained from cellular carriers and cell phones.
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way.
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned.
Forensic Odontology: Principles and Practice details the aspects necessary to become an accomplished forensic odontologist, including an illustration of the skills necessary to become an expert witness.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.
Police Psychology: New Trends in Forensic Psychological Science is a relatively new specialty that can be broadly defined as the application of psychological principles and methods to assist law enforcement.
Mass Identifications: Statistical Methods in Forensic Genetics summarizes the state-of-the-art in the field, including methods and recent development in genetics (sequencing).
Threat and Violence Interventions: The Effective Application of Influence evaluates threat and violence risk for various levels of mental health practitioners, law enforcement officers, security professionals, human resource professionals, attorneys, and academics in forensic psychology, sociology, criminology and law.
This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference, IDIA 2018, held in Tshwane, South Africa, in August 2018.
This textbook offers a clear and comprehensive introduction to statistical physics, one of the core components of advanced undergraduate physics courses.
This textbook presents a concise, accessible and engaging first introduction to deep learning, offering a wide range of connectionist models which represent the current state-of-the-art.
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018.
This book aims to bring together researchers and practitioners working across domains and research disciplines to measure, model, and visualize complex networks.
This book constitutes the refereed proceedings of the 15th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2018, held in Barcelona, Spain, in August 2018.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
This book constitutes the refereed proceedings of the 11th International Symposium on Algorithmic Game Theory, SAGT 2018, held in Beijing, China, in September 2018.
This two-volume set constitutes the refereed post-conference proceedings of the 12th International Conference on Simulation Tools and Techniques, SIMUTools 2020, held in Guiyang, China, in August 2020.
This book constitutes the refereed proceedings of the 15th International Conference on Cognitive Radio-Oriented Wireless Networks, CROWNCOM 2020, held in Rome, Italy, in November 2020.
This book constitutes the proceedings of the 22nd Conference on Integer Programming and Combinatorial Optimization, IPCO 2021, which took place during May 19-21, 2021.
This book briefly summarizes the current state of the art technologies and solutions for location and tracking (L&T) in wireless sensor networks (WSN), focusing on RSS-based schemes.
This book introduces the space community to the novel SpaceFibre protocol, developed under the guidance of the European Space Agency (ESA) as the forthcoming, high speed (Gbps) communication protocol for satellite on-board communication.
This book represents the experience of successful researchers from four continents on a broad range of intelligent systems, and it hints how to avoid anticipated conflicts and problems during multidisciplinary innovative research from Industry 4.
This book provides a modern static imperfect bifurcation theory applicable to bifurcation phenomena of physical and engineering problems and fills the gap between the mathematical theory and engineering practice.
This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers.
This monograph presents a technique, developed by the author, to design asymptotically exponentially stabilizing finite-dimensional boundary proportional-type feedback controllers for nonlinear parabolic-type equations.
This book presents several aspects of research on mathematics that have significant applications in engineering, modelling and social matters, discussing a number of current and future social issues and problems in which mathematical tools can be beneficial.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information and Communication Technologies in Agriculture, Food and Environment, HAICTA 2017, held in Chania, Crete, Greece, in September 2017.
This book gathers the most essential results, including recent ones, on linear-quadratic optimal control problems, which represent an important aspect of stochastic control.
This book is aimed to make careful analysis to various mathematical problems derived from shock reflection by using the theory of partial differential equations.
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.
This book constitutes the proceedings of the 24th International Conference on Principles and Practice of Constraint Programming, CP 2018, held in Lille, France, in August 2018.
This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain.