Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company.  (17)
  • Safari, an O'Reilly Media Company.  (3)
  • Ordinateurs  (10)
  • Commerce
  • Computer security ; Management
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469078342
    Language: English
    Pages: 1 online resource (19838 pages)
    Edition: 1st edition
    DDC: 910.285
    Keywords: Computers ; Computers ; Audiobooks ; computers ; Computers ; Ordinateurs
    Abstract: Billions of people around the globe use various applications of spatial computing daily-by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pokemon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places. It has changed our lives and infrastructures profoundly, marking a significant shift in how we make our way in the world. The book offers accessible descriptions of GPS and location-based services, including the use of Wi-Fi, Bluetooth, and RFID for position determination out of satellite range; remote sensing, which uses satellite and aerial platforms to monitor such varied phenomena as global food production, the effects of climate change, and subsurface natural resources on other planets; geographic information systems (GIS), which store, analyze, and visualize spatial data; spatial databases, which store multiple forms of spatial data; and spatial statistics and spatial data mining, used to analyze location-related data.
    Note: Online resource; Title from title page (viewed June 2, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469076607
    Language: English
    Pages: 1 online resource (37354 pages)
    Edition: 1st edition
    DDC: 005.8
    Keywords: Computers ; Electronic digital computers ; Audiobooks ; computers ; Electronic digital computers ; Computers ; Ordinateurs ; Downloadable audio books ; Audiobooks ; Audiobooks ; Livres audio
    Abstract: Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Listen to this book to: understand blockchain and transaction technologies, set up and run cryptocurrency accounts, identify users of cryptocurrencies, and more. With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies shows you how to detect it and, more importantly, stop it in its tracks.
    Note: Online resource; Title from title page (viewed December 3, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469071305
    Language: English
    Pages: 1 online resource (48730 pages)
    Edition: 1st edition
    DDC: 006.3
    Keywords: Computers ; Computers ; Audiobooks ; computers ; COMPUTERS / Intelligence (AI) & Semantics ; Computers ; Downloadable audio books ; Ordinateurs ; Audiobooks ; Livres audio
    Abstract: Step into the future with AI The term "Artificial Intelligence" has been around since the 1950s, but a lot has changed since then. Today, AI is referenced in the news, books, movies, and TV shows, and the exact definition is often misinterpreted. Artificial Intelligence for Dummies provides a clear introduction to AI and how it's being used today. In this book, you'll get a clear overview of the technology, the common misconceptions surrounding it, and a fascinating look at its applications in everything from self-driving cars and drones to its contributions in the medical field. - Learn about what AI has contributed to society - Explore uses for AI in computer applications - Discover the limits of what AI can do - Find out about the history of AI The world of AI is fascinating-and this hands-on guide makes it more accessible than ever!
    Note: Online resource; Title from title page (viewed February 19, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469074344
    Language: English
    Pages: 1 online resource (26034 pages)
    Edition: 1st edition
    DDC: 005.45
    Keywords: Computers ; Computers ; Audiobooks ; computers ; COMPUTERS ; Software Development & Engineering ; General ; Computers ; Downloadable audio books ; Ordinateurs ; Audiobooks ; Livres audio
    Abstract: This is an all-purpose toolkit for your programming career. It has been built by Jordan Hudgens over a lifetime of coding and teaching coding. It helps you identify the key questions and stumbling blocks that programmers encounter, and gives you the answers to them! It is a comprehensive guide containing more than fifty insights that you can use to improve your work, and to give advice in your career. The book is split up into three topic areas: Coder Skills, Freelancer Skills, and Career Skills, each containing a wealth of practical advice. Coder Skills contains advice for people starting out, or those who are already working in a programming role but want to improve their skills. It includes such subjects as how to study and understand complex topics, and getting past skill plateaus when learning new languages. Freelancer Skills contains advice for developers working as freelancers or with freelancers. It includes such subjects as knowing when to fire a client, and tips for taking over legacy applications. Career Skills contains advice for building a successful career as a developer. It includes such subjects as how to improve your programming techniques, and interview guides and developer salary negotiation strategies.
    Note: Online resource; Title from title page (viewed July 24, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469073118
    Language: English
    Pages: 1 online resource (21364 pages)
    Edition: 1st edition
    Keywords: Computers ; Electronic digital computers ; Audiobooks ; computers ; COMPUTERS ; General ; Electronic digital computers ; Computers ; Downloadable audio books ; Ordinateurs ; Audiobooks ; Livres audio
    Abstract: A few decades into the digital era, scientists discovered that thinking in terms of computation made possible an entirely new way of organizing scientific investigation; eventually, every field had a computational branch: computational physics, computational biology, computational sociology. More recently, "computational thinking" has become part of the K-12 curriculum. But what is computational thinking? This volume in the MIT Press Essential Knowledge series offers an accessible overview. The authors explain that computational thinking (CT) is not a set of concepts for programming; it is a way of thinking that is honed through practice: the mental skills for designing computations to do jobs for us, and for explaining and interpreting the world as a complex of information processes. Mathematically trained experts (known as "computers") who performed complex calculations as teams engaged in CT long before electronic computers. The authors identify six dimensions of today's highly developed CT-methods, machines, computing education, software engineering, computational science, and design-and cover each in a chapter. Along the way, they debunk inflated claims for CT and computation while making clear the power of CT in all its complexity and multiplicity.
    Note: Online resource; Title from title page (viewed April 23, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469072852
    Language: English
    Pages: 1 online resource (25294 pages)
    Edition: 1st edition
    DDC: 658.4/03028563
    Keywords: Computers ; Electronic digital computers ; Audiobooks ; computers ; Electronic digital computers ; Computers ; Ordinateurs
    Abstract: Artificial Intelligence in Practice is a fascinating look into how companies use AI and machine learning to solve problems. Presenting fifty case studies of actual situations, this book demonstrates practical applications to issues faced by businesses around the globe. The rapidly evolving field of artificial intelligence has expanded beyond research labs and computer science departments and made its way into the mainstream business environment. Artificial intelligence and machine learning are cited as the most important modern business trends to drive success. It is used in areas ranging from banking and finance to social media and marketing. This technology continues to provide innovative solutions to businesses of all sizes, sectors, and industries. This engaging and topical book explores a wide range of cases illustrating how businesses use AI to boost performance, drive efficiency, and analyse market preferences. Bestselling author and renowned AI expert Bernard Marr reveals how machine learning technology is transforming the way companies conduct business. This detailed examination provides an overview of each company, describes the specific problem and explains how AI facilitates resolution. Each case study provides a comprehensive overview, including some technical details as well as key learning summaries.
    Note: Online resource; Title from title page (viewed May 31, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9781469076423
    Language: English
    Pages: 1 online resource (12223 pages)
    Edition: 1st edition
    DDC: 658.0557
    Keywords: Computers ; Electronic digital computers ; Audiobooks ; computers ; Electronic digital computers ; Computers ; Ordinateurs
    Abstract: Can blockchain solve your biggest business problem? While the world is transfixed by bitcoin mania, your competitors are tuning out the noise and making strategic bets on blockchain. Your rivals are effortlessly tracking every last link in their supply chains. They're making bureaucratic paper trails obsolete while keeping their customers' data safer and discovering new ways to use this next foundational technology to sustain their competitive advantage. What should you be doing with blockchain now to ensure that your business is poised for success? Blockchain: The Insights You Need from Harvard Business Review brings you today's most essential thinking on blockchain, explains how to get the right initiatives started at your company, and prepares you to seize the opportunity of the coming blockchain wave. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues-blockchain, cybersecurity, AI, and more-each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow.
    Note: Online resource; Title from title page (viewed September 17, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469073453
    Language: English
    Pages: 1 online resource (24783 pages)
    Edition: 1st edition
    DDC: 658.8
    Keywords: Computers ; Computers ; Audiobooks ; computers ; COMPUTERS ; General ; Computers ; Downloadable audio books ; Ordinateurs ; Audiobooks ; Livres audio
    Abstract: Get on board the next massive marketing revolution AI for Marketing and Product Innovation offers creatives and marketing professionals a non-tech guide to artificial intelligence (AI) and machine learning (ML)-twin technologies that stand poised to revolutionize the way we sell. The future is here, and we are in the thick of it; AI and ML are already in our lives every day, whether we know it or not. The technology continues to evolve and grow, but the capabilities that make these tools world-changing for marketers are already here-whether we use them or not. This book helps you lean into the curve and take advantage of AI's unparalleled and rapidly expanding power. More than a simple primer on the technology, this book goes beyond the "what" to show you the "how": How do we use AI and ML in ways that speak to the human spirit? How to we translate cold technological innovation into creative tools that forge deep human connections? Written by a team of experts at the intersection of neuroscience, technology, and marketing, this book shows you the ins and outs of these groundbreaking technological tools.
    Note: Online resource; Title from title page (viewed February 26, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469075228
    Language: English
    Pages: 1 online resource (40165 pages)
    Edition: 1st edition
    Keywords: Computers ; Electronic digital computers ; Audiobooks ; computers ; COMPUTERS ; Security ; General ; Electronic digital computers ; Computers ; Downloadable audio books ; Ordinateurs ; Audiobooks ; Livres audio
    Abstract: Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks. They can cause immense harm to individuals or businesses online and make large sums of money-safe in the knowledge that the victim will rarely report the matter to the police. For those tasked with probing such crimes in the field, information on investigative methodology is scarce. While there are high-quality manuals for conducting digital examinations on a device or network that has been hacked, the Cybercrime Investigators Handbook is the first guide on how to commence an investigation from the location the offence occurred and collect the evidence necessary to locate and prosecute the offender. This valuable contribution to the field teaches listeners to locate, lawfully seize, preserve, examine, interpret, and manage the technical evidence that is vital for effective cybercrime investigation.
    Note: Online resource; Title from title page (viewed October 8, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469096810
    Language: English
    Pages: 1 online resource (13733 pages)
    Edition: 1st edition
    Keywords: Computers ; Electronic digital computers ; Audiobooks ; computers ; Electronic digital computers ; Computers ; Ordinateurs
    Abstract: Using information in its everyday, nonspecialized sense, Michael Buckland explores the influence of information on what we know, the role of communication and recorded information in our daily lives, and the difficulty (or ease) of finding information. He shows that all this involves human perception, social behavior, changing technologies, and issues of trust. Buckland argues that every society is an "information society"; a "non-information society" would be a contradiction in terms. But the shift from oral and gestural communication to documents, and the wider use of documents facilitated by new technologies, have made our society particularly information intensive. Buckland describes the rising flood of data, documents, and records, outlines the dramatic long-term growth of documents, and traces the rise of techniques to cope with them. He examines the physical manifestation of information as documents, the emergence of data sets, and how documents and data are discovered and used. He explores what individuals and societies do with information; offers a basic summary of how collected documents are arranged and described; considers the nature of naming; explains the uses of metadata; and evaluates selection methods, considering relevance, recall, and precision.
    Note: Online resource; Title from title page (viewed April 30, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781439845790 , 1439845794
    Language: English
    Pages: 1 online resource (388 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Transportation Security measures ; Terrorism Prevention ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local ; Homeland Security ; Computing & IT Security ; Supply Chain Management ; Transport ; Sécurité ; Mesures ; États-Unis ; Terrorism ; Prevention ; Transportation ; Security measures ; United States
    Abstract: Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks—and other attacks on surface transportation assets, including the bombings in Madrid, London, Moscow, and Mumbai—demonstrate the vulnerability of the open systems to disruption and the consequences of the attacks on people, property, and the economy. Now more than ever, it has become imperative for businesses operating in the transportation and transit sectors to develop comprehensive security programs accounting for both natural and man-made hazards and safeguarding people, places, and equipment—while at the same time ensuring operations continuity. Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, Introduction to Transportation Security examines: Basic theories of security and emergency management The integrated nature of the nation’s critical infrastructure and the threats to transportation in each surface mode Federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities The types of disasters that have occurred in the U.S. and selected nations, and their significant economic impacts Cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode Effective methods for organizing, testing, and evaluating transportation security across modes and professions The book covers all transportation modes and their interconnectivity—including highway, air cargo, freight and passenger rail, transit, and maritime. It presents learning objectives and discussion questions to test assimilation of the material and case studies to facilitate a practical understanding of the concepts. Introduction to Transportation Security provides essential information for students in transportation management programs and professionals charged with safeguarding the movement of assets within our interconnected transportation network.
    Note: Online resource; Title from title page (viewed April 19, 2016) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (258 pages)
    Edition: 1st edition
    Keywords: Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local
    Abstract: Environmental finance is about creating the greatest environmental benefit for the largest number of people at the lowest possible cost. That is the first and most important principle listed in Finance Policy for Renewable Energy and a Sustainable Environment . Focusing on what the author considers to be the 23 principles of environmental finance, this text examines the key financial principles necessary to build strategies and adopt policies to deal effectively with environmental challenges. The text encourages making financial decisions based on science, not politics, and considers what it takes to design and execute environmental finance programs in the most cost-effective way possible. Providing a historical overview of how we got to where we are now, and outlining the 23 principles needed to establish a stronger foundation for the future, this text presents the basic financial tools required to understand the concepts presented. It discusses the proper roles of grants, loans and guaranties, the concept and proper use of affordability, understanding leverage, and generating revenue streams for environmental programs. It also examines subsidies, financial risk reduction strategies, and the challenges posed by alternative energy as well as the next generation of environmental programs. As it relates to how environmental projects and improvements are achieved, Finance Policy for Renewable Energy and a Sustainable Environment outlines the greatest benefits at the lowest possible cost to the public. This text is an ideal resource for upper-level undergraduate students in environmental engineering and business courses, as well as practicing environmental engineers.
    Note: Online resource; Title from title page (viewed March 18, 2014) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781466562646 , 1466562641
    Language: English
    Pages: 1 online resource (295 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als
    Keywords: Forensic accounting ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Juricomptabilité ; États-Unis ; BUSINESS & ECONOMICS ; Infrastructure ; SOCIAL SCIENCE ; General ; Forensic accounting ; United States
    Abstract: Understanding the financial motivations behind white collar crime is often the key to the apprehension and successful prosecution of these individuals. Now in its second edition, Criminal Financial Investigations: The Use of Forensic Accounting Techniques and Indirect Methods of Proof provides direct instruction on the "how to" aspects of criminal financial investigations, taking readers through the different approaches used in gathering evidence and demonstrating how to present circumstantial evidence to a judge or jury in a simple and convincing manner. Simplifying how the financial pieces fit together, this text: Presents the logic and reasoning involved in constructing a financial criminal investigation Describes the requirements for legal acceptance of forensic accounting investigations Includes relevant examples of the step-by-step processes involved in financial investigations Explores the pitfalls—and how to avoid them—in financial investigating Contains two investigations with step-by-step procedures from initial inquiry to case completion—for use as term or topical assignments or to promote class discussion New Chapters in the Second Edition: What Is a Financial Investigation? Indirect Methods in Tax Investigations Unique Aspects of Criminal Tax Investigations Innovative Applications Written by a former Special Agent with the Criminal Investigation Division of the U.S. Internal Revenue Service, this volume sets out a successful methodology enabling readers to identify, pursue, and successfully prosecute financial white collar crime.
    Note: Online resource; Title from title page (viewed October 5, 2012) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (470 pages)
    Edition: 1st edition
    Keywords: Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local
    Abstract: Despite all the controversy and hype that climate change has generated, there now exists an overwhelming body of scientific evidence that the problem is real and that its effects are already being felt on a global scale. Part of what makes this a volatile and controversial issue is that it is not just confined to the realms of the scientific community, nor does it have just one simple, predefined solution—it has multifaceted dimensions involving economic, sociological, political, psychological, and personal issues, making this a topic that affects every person on earth now and in the future. Connecting the dots, Climate Management Issues: Economics, Sociology, and Politics is the first book to propose a truly comprehensive solution to effectively deal with climate change in both the short and long term. It reaches across diverse sectors of society to link issues in climate change management and offer new insights into the complex interrelationships. As the author emphasizes, climate change extends far beyond the physical sciences to affect lifestyles, cultural values, political systems, economics, and health. An overview of the physical science of climate change gives readers a firm understanding of the concepts they need for policy and decision making, sociological applications, and community leadership. The book then focuses on multifaceted aspects such as international cooperation, journalistic balance, human psychology, international policy, national security, socioeconomic impacts, agricultural conservation, healthcare, the economics of mitigation, climate modeling, and error amplification. This timely volume puts on center stage those crucial ideas that are usually overlooked, misunderstood, or lost in media sensationalism. Enlightening and empowering readers, it looks at the decisions that must be made to mitigate climate change problems before irreversible damage is done.
    Note: Online resource; Title from title page (viewed December 14, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9780429251306 , 0429251300 , 9780511324840 , 0511324847 , 9781439869147 , 1439869146 , 9781466514157 , 1466514159 , 9781439869123
    Language: English
    Pages: 1 online resource (430 pages)
    Edition: 3rd edition
    Parallel Title: Erscheint auch als
    DDC: 363.25/968
    Keywords: Money laundering investigation ; Money laundering Prevention ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Blanchiment de l'argent ; Enquêtes ; États-Unis ; Money laundering investigation ; Money laundering ; Prevention ; United States
    Abstract: Many changes have occurred in the twenty-five years that have passed since the enactment of the Money Laundering Control Act of 1986. The law has been amended, new underlying crimes have been added, and court decisions have modified its scope. The Act remains an important tool in combating criminal activity. Now in its third edition, Money Laundering: A Guide for Criminal Investigators covers the basics of finding ill-gotten gains, linking them to the criminal, and seizing them. Providing a clear understanding of money laundering practices, it explains the investigative and legislative processes that are essential in detecting and circumventing this illegal and dangerous activity. Highlights of the Third Edition include Important court decisions and changes in federal law since the Second Edition New trends in crime and terrorism financing The rise of money laundering in connecting with major frauds, including the Bernie Madoff case Law and policy shifts related to terrorism and financing since the Obama administration New methods for financial intelligence and the filing of Suspicious Activity Reports How changes in technology have enabled launderers to move funds more easily and anonymously Knowledge of the techniques used to investigate these cases and a full understanding of the laws and regulations that serve as the government's weapons in this fight are essential for the criminal investigator. This volume arms those tasked with finding and tracing illegal proceeds with this critical knowledge, enabling them to thwart illegal profiteering by finding the paper trail.
    Note: Online resource; Title from title page (viewed December 19, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Productivity Press | Boston, MA : Safari
    ISBN: 9781420090611
    Language: English
    Pages: 1 online resource (248 pages)
    Edition: 2nd edition
    Series Statement: Finance professional collection
    Keywords: Managerial accounting ; Accountants ; Industrial management ; Electronic books ; local ; Comptabilité de gestion ; Comptables ; Gestion d'entreprise ; accountants ; BUSINESS & ECONOMICS / Management Science ; BUSINESS & ECONOMICS / Quality Control ; BUSINESS & ECONOMICS / Industries / Manufacturing Industries ; Accountants ; Industrial management ; Managerial accounting ; Commerce ; Business & Economics ; Accounting
    Abstract: The first edition of Brian Maskell‘s now classic work proved that when given the chance, accountants would prefer not to serve out their working days as number crunching automatons. With its energetic tone and common sense approach, the book inspired numbers people at all levels to become true allies in their companies lean revolutions. It enco
    Note: Online resource; Title from title page (viewed June 18, 2009) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 0738495603
    Language: English
    Pages: 1 online resource (356 pages)
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    Keywords: Business Forms ; Computer programs ; Forms management Computer programs ; IBM software ; Electronic books ; local ; Gestion des formulaires ; Logiciels ; Logiciels IBM ; Gestion des formulaires ; Logiciels ; Business ; Forms ; Computer programs ; Forms management ; Computer programs ; IBM software ; Commerce ; Business & Economics ; Local Commerce
    Abstract: This IBM Redbooks publication describes the features and functionality of Workplace Forms and each of its component products. After introducing the products and providing an overview of features and functionality, we discuss the underlying product architecture and address the concept of integration. To help potential users, architects, and developers better understand how to develop and implement a forms application, we introduce a specific scenario based on a "Sales Quotation Approval" application. Using this base scenario as a foundation, we describe in detail how to build an application that captures data in a form, then applies specific business logic and workflow to gain approval for a specific product sales quotation. Throughout the scenario, we build upon the complexity of the application and introduce increasing integration points with other data systems. Ultimately, we demonstrate how an IBM Workplace Forms application can integrate with WebSphere Portal, IBM DB2 Content Manager, and Lotus Domino. Note: The code used for building this sample scenario application is available for download. For specific information about how to download the sample code, please refer to Appendix A. Additional material". Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed July 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...