Showing 1 - 10 of 221
uncertainty. Different models ranging from stochastic to grey and their connection will be outlines with highlighting possible …
Persistent link: https://www.econbiz.de/10012393215
"This book addresses the use of electronic devices and software for crime prevention, investigation, and the …
Persistent link: https://www.econbiz.de/10011727432
uncertainty in handling solutions, analysis, and applications"--Provided by publisher. …Interval mathematics as a potential weapon against uncertainty / Hend Dawood -- Uncertainty modeling using expert …'s knowledge as evidence / D. Datta -- Evidence-based uncertainty modeling / Tazid Ali -- Hybrid set structures for soft computing …
Persistent link: https://www.econbiz.de/10011727925
"This book explains the potential hazards of petroleum engineering activities, emphasizing risk assessments in drilling …General approach to risk analysis / Davorin Matanovic -- Risk due to wellbore instability / Nediljka Gaurina …-Medjimurec, Borivoje Pasic -- Risk due to pipe sticking / Nediljka Gaurina-Medjimurec, Borivoje Pasic -- Lost circulation / Nediljka …
Persistent link: https://www.econbiz.de/10011727897
"This book provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a … -- Evidentiary implications of potential security weaknesses in forensic software / Chris Ridder -- Combating internet-based crime …
Persistent link: https://www.econbiz.de/10011727052
-street crime risk / -- Spencer Chainey and Jake Desyllas -- Chapter VI. Core models for state-of-the-art microscopic traffic …"This book discusses leading research on the use of computer simulation of crime patterns to reveal hidden processes of …Preface -- An overview of crime simulation / Lin Liu and John Eck -- Section I. The role of simulation in crime …
Persistent link: https://www.econbiz.de/10011725821
addresses its multifaceted nature. The chapters in this book depict the nature of the crime and the motives of the criminals … cyber crimes with a privacy-enabled forensic profiling system -- ASKARI: a crime text mining approach -- Basic steganalysis … relationship between digital forensics, corporate governance, IT governance and IS governance -- Law, cyber crime and digital …
Persistent link: https://www.econbiz.de/10011725991
"This book features a diverse array of GIS applications in crime analysis, from general issues such as GIS as a … cooperation / Mark R. Leipnik, Donald P. Albert -- 3. Garbage in, garbage out : geocoding accuracy and spatial analysis of crime … Wang, Van M. O'Brien -- 6. Geographic profiling for serial crime investigation / D. Kim Rossmo, Ian Laverty, Brad Moore …
Persistent link: https://www.econbiz.de/10011726127
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727905
"This book combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011728080