您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. PLACE, SPACE, AND POLICE

  2. Police investigations of serial murder, rape and arson can be assisted by a geographic perspective on the spatial behavior that led to the crime scene. For any crime to occur there must have been an intersection in both time and place between the of
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:265216
    • 提供者:wsdsgfuqiang
  1. The Mathematics of Geographic Profiling

  2. Given a series of linked crimes committed by the same offender, can we make predictions about the anchor point of the offender? The anchor point can be a place of residence, a place of work, or some other commonly visited location.
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:1048576
    • 提供者:wsdsgfuqiang
  1. Geographic Profiling: Hype or Hope?

  2. Strategic information management system used to assist in investigations into serial crimes First commercial software created by Kim D. Rossmo Analyzes crime locations to determine the most probable area of offender residence.
  3. 所属分类:其它

    • 发布日期:2010-02-24
    • 文件大小:1048576
    • 提供者:wsdsgfuqiang
  1. 2010 mcm Contest Problems

  2. IMPORTANT CHANGE TO CONTEST RULES FOR MCM/ICM 2010: Teams (Student or Advisor) are now required to submit an electronic copy of their solution paper by email to solutions@comap.com. Your email MUST be received at COMAP by the submission deadline of
  3. 所属分类:C

    • 发布日期:2010-02-24
    • 文件大小:4096
    • 提供者:wsdsgfuqiang
  1. Prosecuting Computer Crimes

  2. This manual is a product of the Computer Crime and Intellectual Property Section (CCIPS) of the United States Department of Justice. Just as in Searching and Seizing Computers and Electronic Evidence (2d ed. 2002) and Prosecuting Intellectual Proper
  3. 所属分类:专业指导

    • 发布日期:2010-08-25
    • 文件大小:799744
    • 提供者:ggeenn
  1. CISSP in 21 Days

  2. Day 1: This chapter covers various concepts related to security management practices, control environment, and asset classification and controls. Day 2: This chapter discusses important requirements of security awareness and training as well as risk
  3. 所属分类:Access

    • 发布日期:2011-02-24
    • 文件大小:6291456
    • 提供者:cpckp
  1. The Art of Memory Forensics

  2. Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in th
  3. 所属分类:网络安全

    • 发布日期:2014-12-23
    • 文件大小:8388608
    • 提供者:ericwyj
  1. Flask By Example(PACKT,2016)

  2. This book will take you on a journey from learning about web development using Flask to building fully functional web applications. In the first major project, we develop a dynamic Headlines application that displays the latest news headlines along
  3. 所属分类:Python

    • 发布日期:2016-04-16
    • 文件大小:4194304
    • 提供者:vanridin
  1. Flask.By.Example.1785286935

  2. What You Will Learn Build three web applications from the ground up using the powerful Python micro framework, Flask. Dynamically display data to your viewers, based on their requests Store user and static data in SQL and NoSQL databases and use thi
  3. 所属分类:Python

    • 发布日期:2016-04-18
    • 文件大小:4194304
    • 提供者:ramissue
  1. Flask.By.Example.2016.3.pdf

  2. This book will take you on a journey from learning about web development using Flask to building fully functional web applications. In the first major project, we develop a dynamic Headlines application that displays the latest news headlines along
  3. 所属分类:Python

    • 发布日期:2016-04-19
    • 文件大小:4194304
    • 提供者:xinconan1992
  1. the art of memory forensic

  2. windows 内存分析的书,Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook
  3. 所属分类:Windows Server

    • 发布日期:2017-09-06
    • 文件大小:5242880
    • 提供者:xy2090
  1. 2008年6月大学英语六级A卷真题

  2. 这是复习及备战六级的秘籍,很赞的资源哦2008年6月大学英语六级A卷真题 Part I Writing (30 minutes) Will E-books Replace Traditional Books? 1.随着信息技术的发展,电子图书越来越多; 2.有人认为电子图书将会取代传统图书,理由是… 3.我的看法。 Part Ⅱ Reading Comprehension(Skimming and Scanning)(15 minutes) What Will the World Be Lik
  3. 所属分类:C

    • 发布日期:2009-01-19
    • 文件大小:104448
    • 提供者:watermenu
  1. Machine+Learning+Methods+for+Behaviour+Analysis+and+Anomaly+Detection-2018.pdf

  2. Intelligent video systems and analytics represent an active research field combining methods from computer vision, machine learning, data mining, signal processing and other areas for mining meaningful information from raw video data. The availabilit
  3. 所属分类:机器学习

    • 发布日期:2018-03-04
    • 文件大小:3145728
    • 提供者:windstand
  1. Flask By Example.pdf 最新 原版

  2. About This Book The most up-to-date book on Flask on the market Create your own world-class applications and master the art of Flask by unravelling its enigma through this journey This step-by-step tutorial is packed with examples on blending differ
  3. 所属分类:Python

    • 发布日期:2018-10-30
    • 文件大小:4194304
    • 提供者:tianyang009
  1. Practical Windows Forensics

  2. Over the last few years, the wave of the cybercrime has risen rapidly. We have witnessed many major attacks on the governmental, military, financial, and media sectors. Tracking all these attacks and crimes requires a deep understanding of operating
  3. 所属分类:系统安全

    • 发布日期:2019-01-23
    • 文件大小:20971520
    • 提供者:polar9527
  1. Internet Forensics .7z

  2. Because its so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually its your credit card number theyre after, and they wont stop there. Not just mere annoyances, these scams are real crimes
  3. 所属分类:系统安全

    • 发布日期:2019-08-21
    • 文件大小:860160
    • 提供者:drjiachen
  1. Forensic Analysis of Google Chrome Cache Files .pdf

  2. Chrome浏览器缓存文件中的电子取证Internet Forensics has become an indispensable part of Cyber Forensics. This is due to the rapid growth in the number of cybercrimes which are related to Internet usage. These crimes vary from malware crimes to crimes related
  3. 所属分类:其它

    • 发布日期:2020-02-22
    • 文件大小:1048576
    • 提供者:beyond_9521
  1. pandas常用操作.pdf

  2. pandas库的常用操作,参考书籍《Pandas Cookbook》,内容干货,推荐下载!movie get_dtype_counts# output the number of columns with each specific data type: movie. select_dtypes(include['int ]).head(# select only integer columns movie. filter(1ike=' facebook').head()#1ike参数表示包含此
  3. 所属分类:Python

    • 发布日期:2019-08-31
    • 文件大小:701440
    • 提供者:justisme
  1. crimes-in-chicago-源码

  2. 具有统计意义的见解 内容 项目描述 该项目的目标是让您应用在上一课中关于描述性和推理性统计,商业智能和线性回归的知识,得出一些有趣的见解并测试其统计意义。 对于此项目,您将需要选择一个数据集并使用Python进行探索。 您将使用不同的可视化内容来组合一个故事,以进行演示,以显示您从数据中获得的见解(接受Tableau)。 您将必须基于所得出的见解来定义和检验几个假设。 您应该使用Python和本章学到的概念来证明自己的熟练程度。 您将在此项目的小组中工作,因此请做好GitHub操纵和团队合作
  3. 所属分类:其它

    • 发布日期:2021-03-06
    • 文件大小:136192
    • 提供者:weixin_42146086
  1. Crimes-user-module:Android应用程序,用于用户举报犯罪-源码

  2. 犯罪用户模块 Android应用程序供用户举报犯罪行为。
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:1048576
    • 提供者:weixin_42173218
« 12 »