You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This is a comprehensive and broad introduction to computer forensics, looking at the areas of law enforcement, national security and the financial sector.
Acoustics, Aircraft, Airports, Sound intensity, Acoustic measurement, Noise (environmental), Noise control (acoustic), Monitors, Automatic, Test equipment, Measuring instruments, Data processing
Annotation A comprehensive and broad introduction to computer and intrusion forensics, covering the areas of law enforcement, national security and corporate fraud, this practical book helps professionals understand case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, and machine learning.
It is by now an obvious observation that much of the world depends on information technology. Our infrastructure relies on IT: our buildings, finance systems, roads, airplanes, cars, televisions, washing machines and bread makers; as does much of what we do: our banking, learning and communicating. Almost everyone today uses information technology, but few know how it works, and very few indeed understand the mysteries of how to build new systems. This imbalance between ‘users’ and ‘knowers’ grows worse every year. With the ‘dot com collapse’, the number of students studying computers, and information technology more generally, has been shrinking steadily. In the long run, this t...
None
Annotation This collection of 85 papers from the May 2001 symposium presents developments in cluster and grid computing that enable applications to share resources and content across the Internet in a peer-to-peer manner. The main areas of discussion are component and agent approaches, input/output and databases, message passing, scheduling, and distributed shared memory. Some of the topics are design of a generic platform for scalable cluster computing based on middleware techniques, early experiences with the EGrid testbed, software environments for cluster-based display systems, the performance of CORBA for distributed and grid applications, sabotage-tolerance mechanisms for volunteer computing systems, and a tool kit for the simulation of application scheduling. No subject index. c. Book News Inc.