Modern developments of Random Matrix Theory as well as pedagogical approaches to the standard core of the discipline are surprisingly hard to find in a well-organized, readable and user-friendly fashion.
This book brings together research works, ideas, critical reviews and strategic proposals encompassing various ethical and corporate governance issues in workplaces and organizations around the globe.
This book presents solutions to control problems in a number of robotic systems and provides a wealth of worked-out examples with full analytical and numerical details, graphically illustrated to aid in reader comprehension.
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.
These proceedings focus on selected aspects of the current and upcoming trends in transportation, logistics, supply chain management, and decision sciences.
This book investigates individual companies' and industries' supply chain risk management approaches to identify risk drivers and verify effective risk-reduction measures and business continuity plans.
Crime Scene Investigation Laboratory Manual, Second Edition, is written by a former crime scene investigator and forensic scientist who provides practical, straightforward, and immediately applicable best practices.
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems.
Forensic Examination of Signatures explains the neuroscience and kinematics of signature production, giving specific details of research carried out on the topic.
In our attempts to understand crime, researchers typically focus on proximate factors such as the psychology of offenders, their developmental history, and the social structure in which they are embedded.
Forensic Handwriting Identification: Fundamental Concepts and Principles teaches the law enforcement and legal communities the major principles involved in handwriting and hand-printing analysis as applied to many types of investigations, including fraud, homicide, suicide, drug trafficking/clandestine labs, sexual offenses, threats and extortion, blackmail, arson, bombings, and theft.
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively.
Cell Phone Location Evidence for Legal Professionals: Understanding Cell Phone Location Evidence from the Warrant to the Courtroom is a guide, in plain language, for digital forensics professionals, attorneys, law enforcement professionals and students interested in the sources, methods and evidence used to perform forensic data analysis of cell phones, call detail records, real time ping records and geo-location data obtained from cellular carriers and cell phones.
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way.
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned.
Forensic Odontology: Principles and Practice details the aspects necessary to become an accomplished forensic odontologist, including an illustration of the skills necessary to become an expert witness.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.
Police Psychology: New Trends in Forensic Psychological Science is a relatively new specialty that can be broadly defined as the application of psychological principles and methods to assist law enforcement.
Mass Identifications: Statistical Methods in Forensic Genetics summarizes the state-of-the-art in the field, including methods and recent development in genetics (sequencing).
Threat and Violence Interventions: The Effective Application of Influence evaluates threat and violence risk for various levels of mental health practitioners, law enforcement officers, security professionals, human resource professionals, attorneys, and academics in forensic psychology, sociology, criminology and law.
This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference, IDIA 2018, held in Tshwane, South Africa, in August 2018.
This textbook offers a clear and comprehensive introduction to statistical physics, one of the core components of advanced undergraduate physics courses.
This textbook presents a concise, accessible and engaging first introduction to deep learning, offering a wide range of connectionist models which represent the current state-of-the-art.
This book constitutes the refereed proceedings of the First International Conference on Ubiquitous Communications and Network Computing, UBICNET 2017, held in Bangalore, India, in August 2017.
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018.
Given the increasing uncertainty due to catastrophic climate events, terrorist attacks, and economic crises, this book addresses planning for resilience by focusing on sharing knowledge among policy-makers, urban planners, emergency teams and citizens.
This book aims to bring together researchers and practitioners working across domains and research disciplines to measure, model, and visualize complex networks.
This book constitutes the refereed proceedings of the 15th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2018, held in Barcelona, Spain, in August 2018.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
This book brings simplicity to passive investing, smart beta, and factor investing, which is the fastest growing type of investment in the asset management industry.
This book constitutes the refereed proceedings of the 11th International Symposium on Algorithmic Game Theory, SAGT 2018, held in Beijing, China, in September 2018.
This two-volume set constitutes the refereed post-conference proceedings of the 12th International Conference on Simulation Tools and Techniques, SIMUTools 2020, held in Guiyang, China, in August 2020.
This book constitutes the refereed proceedings of the 15th International Conference on Cognitive Radio-Oriented Wireless Networks, CROWNCOM 2020, held in Rome, Italy, in November 2020.
This book constitutes the proceedings of the 22nd Conference on Integer Programming and Combinatorial Optimization, IPCO 2021, which took place during May 19-21, 2021.
This book briefly summarizes the current state of the art technologies and solutions for location and tracking (L&T) in wireless sensor networks (WSN), focusing on RSS-based schemes.