Showing 1 - 10 of 359
-payment solutions and M-commerce fraud management / Seema Nambiar, Chang-Tien Lu -- 10. The CRM process and the banking industry … banking / L. Narayanan -- 14. A reference model for savings bank / Annett Mauser -- 15. A semi-online training algorithm for …
Persistent link: https://www.econbiz.de/10011725781
-- Pre-GFC bank behaviour change and Basel accords -- The "smart" regulatory framework -- The "smart" regulatory features of …
Persistent link: https://www.econbiz.de/10011727996
Digital evidence -- Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools / Simson Garfinkel -- Voice over IP : privacy and forensic implications / Jill Slay, Matthew Simon -- Volatile memory collection and analysis for windows...
Persistent link: https://www.econbiz.de/10011727052
, Russell Brinkworth -- Palmprint recognition based on subspace analysis of Gabor filter bank / Moussadek Laadjel ... [et al …
Persistent link: https://www.econbiz.de/10011727432
Menezes, and Mairon Belchior -- Chapter XVI. FraudSim: simulating fraud in a public delivery program / Yushim Kim and …
Persistent link: https://www.econbiz.de/10011725821
Digital forensics is the science of collecting evidence often used in a court of law to prosecute those who engage in digital activities that are deemed unlawful. This book puts together contributions from leading experts in digital forensics and associated fields, making information on this new...
Persistent link: https://www.econbiz.de/10011725991
"This book features a diverse array of GIS applications in crime analysis, from general issues such as GIS as a communication process and inter-jurisdictional data sharing to specific applications in tracking serial killers and predicting juvenile violence. The book showcases a broad range of...
Persistent link: https://www.econbiz.de/10011726127
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727905
"This book combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011728080
"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011728228