Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Precrime Data Mining
Table 1.1: Illustrative Examples of the Modus Operandi Free-Text Field.
Chapter 2: Investigative Data Warehousing
Table 2.1: Acxiom Infobase Basic Data Profile
Table 2.2: Partial List of Type of Information or Companies Provided by Acxiom
Table 2.3: Type of Information Provided by Data Quick
Table 2.4: Criminalfiles.info available jurisdictions.
Table 2.5: Anatomy of a Cookie
Chapter 5: Text Mining: Clustering Concepts
Table 5.1: LIWC 2001 Dimensions and Sample Words
Chapter 6: Neural Networks: Classifying Patterns
Table 6.1: Model with Three Inputs, a Set of Formula Weights, and One Output
Table 6.2: Classification of Burglary Offense
Table 6.3: Modus Operandi Text
Chapter 8: NetFraud: A Case Study
Table 8.1: On-Line Auction Fraud Statistics
Table 8.2: Top Three Payment Methods
Table 8.3: Fraud Statistics Reported by fraud.org
Table 8.4: Transactional Data Variables
Chapter 9: Criminal Patterns: Detection Techniques
Table 9.1: Methods of Insurance Fraud Detection
Chapter 12: Mapping Crime: Clustering Case Work
Table 12.1: Classification of Sexual Crimes
Table 12.2: Number of Crimes Attributed to Known Offenders
Table 12.3: Data Encoding Examples (3 Yes and 3 No)
Table 12.4: Cluster Comparison
Previous page
Table of content
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors:
Jesus Mena
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Advanced SELECT Options
Other Tips
Data Dictionary Report
Appendix A Common Issues
SQL Hacks
Hack 12. Simplify Complicated Updates
Hack 57. Generate Unique Sequential Numbers
Hack 71. Extract Lots of Rows
Hack 85. Traverse a Simple Tree
Hack 99. Dont Run Out of Disk Space
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Who this book is for
Business activities
Business service layer
Entity-centric business service design (a step-by-step process)
Task-centric business service design (a step-by-step process)
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 11. How Far? How Fast? Geo-Enabling Your Spreadsheet
Hack 19. Analyze Elevation Profiles for Wireless Community Networks
Hack 80. Automatically Geocode U.S. Addresses
Hack 90. Crawl the Geospatial Web with RedSpider
Hack 97. Set Up an OpenGuide for Your Hometown
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Handling WMI Events
Instrumenting .NET Applications with WMI
WMI Providers
VBScript in a Nutshell, 2nd Edition
Program Structure
Classes
Reusable Code Libraries
Program Flow
The Script Component Wizard
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies