Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 20
- Computer security 18
- Computer networks 11
- Engineering & Applied Sciences 8
- History 8
- Penetration testing (Computer security) 8
- Blockchains (Databases) 7
- Computer Science 6
- Computer software 5
- Development 5
- Social welfare & social services 5
- Artificial intelligence 4
- Data protection 4
- Mass media 4
- Python (Computer program language) 4
- Video games 4
- arbetsliv 4
- työelämä 4
- Access control 3
- Application software 3
- Digital media 3
- Human-computer interaction 3
- Information society 3
- Linux 3
- Microsoft Office 3
- Peace 3
- Politics and government 3
- Research 3
- Social aspects 3
- Technological innovations 3
-
81
-
82por Singh, HariTabla de Contenidos: “…You Decide; Values and Facts; Shortcuts that Undercut; Dissect the Suspects; Track the Feedback; Verify the Alibi; Negotiate and Trust or Go Bust; WARS that Resolve; Tamper with the Anchor; Can You Spot Your Blots?; The Frame is the Name of the Game; What Means to What Ends?…”
Publicado 2006
Libro electrónico -
83por Bathen, LuisTabla de Contenidos: “…Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning…”
Publicado 2022
Libro electrónico -
84Publicado 2013Revista digital
-
85
-
86
-
87
-
88por Katchanovski, IvanTabla de Contenidos: “…Chapter 1: Introduction: The Massacre that Changed Ukraine and the World -- Chapter 2: Conflicting Narratives of the Maidan Massacre in Ukraine -- Chapter 3: Video Reconstruction and Content Analysis of the Maidan Massacre on February 20, 2014 -- Chapter 4: Testimonies of Several Hundred Witnesses and 14 Self-Admitted Maidan Snipers -- Chapter 5: Trial and Investigation Testimonies of Wounded Maidan Activists and Witnesses -- Chapter 6: Forensic Ballistic and Medical Examinations by Ukrainian Government Experts -- Chapter 7: The Maidan Massacre on February 18-19, 2014, and Related Cases of Violence during the EuroMaidan in Ukraine -- Chapter 8: The Maidan Massacre Trial Verdict, and Cover-up, Stonewalling, and Evidence Tampering -- Chapter 9: Conclusion and Implications for the Russia-Ukraine War and Other Conflicts in Ukraine…”
Publicado 2024
Libro electrónico -
89
-
90
-
91Publicado 2016“…Hankkeen kohdekaupunkeina olivat Jyväskylä, Tampere ja Turku."…”
Libro electrónico -
92Publicado 2018Libro electrónico
-
93
-
94
-
95Publicado 2017Libro electrónico
-
96Publicado 2017Libro electrónico
-
97Publicado 2018Libro electrónico
-
98
-
99
-
100Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- About the ACFE -- Chapter 1: Introduction -- Defining Occupational Fraud and Abuse -- Research in Occupational Fraud and Abuse -- 2016 Report to the Nations on Occupational Fraud and Abuse -- Notes -- Part I: Asset Misappropriations -- Chapter 2: Introduction to Asset Misappropriations -- Overview -- Definition of Assets -- How Asset Misappropriations Affect Books of Account -- Notes -- Chapter 3: Skimming -- Overview -- Skimming Data from the ACFE 2015 Global Fraud Survey -- Unrecorded Sales -- Understated Sales and Receivables -- Theft of Checks Through the Mail -- Short-Term Skimming -- Converting Stolen Checks -- Concealing the Fraud -- Detection -- Prevention -- Notes -- Chapter 4: Cash Larceny -- Overview -- Cash Larceny Data from the ACFE 2015 Global Fraud Survey -- Incoming Cash -- Cash Larceny from the Deposit -- Miscellaneous Larceny Schemes -- Detection -- Prevention -- Note -- Chapter 5: Check Tampering -- Overview -- Check Tampering Data from the ACFE 2015 Global Fraud Survey -- Forged Maker Schemes -- Intercepted Checks -- Forged Endorsement Schemes -- Altered Payee Schemes -- Concealed Check Schemes -- Authorized Maker Schemes -- Concealment -- Detection -- Prevention -- Electronic Payment Tampering -- Notes -- Chapter 6: Register Disbursement Schemes -- Overview -- Register Disbursement Data from the ACFE 2015 Global Fraud Survey -- False Refunds -- False Voids -- Concealing Register Disbursements -- Detection -- Prevention -- Note -- Chapter 7: Billing Schemes -- Overview -- Billing Scheme Data from the ACFE 2015 Global Fraud Survey -- Shell Company Schemes -- Non-Accomplice Vendor Schemes -- Personal Purchases with Company Funds -- Detection -- Prevention -- Note -- Chapter 8: Payroll and Expense Reimbursement Schemes -- Overview…”
Libro electrónico