1
by Greenberg, Andy
Published 2012
Tantor Media, Inc.
...The machine that kills secrets is a powerful cryptographic code that hides the identities...

2
by Guerra, Peter, Tamburello, Paul
Published 2018
O'Reilly Media
Subjects: ...Machine learning / http://id.loc.gov/authorities/subjects/sh85079324...

3
by Mena, Jesus
Published 2016
Auerbach Publications
Subjects: ...Machine learning / http://id.loc.gov/authorities/subjects/sh85079324...

4 Table of Contents: ... -- C5.0 Algorithm; 3.3.2.2.2 -- K-Nearest Neighbour; 3.3.2.2.3 -- Support Vector Machine (SVM...

5
by Faulkner, Elizabeth A.
Published 2023
Palgrave Macmillan
... and policy responses. Through utilizing what the author identifies as the ‘anti-trafficking machine’ as a...

6
Published 2021
Springer International Publishing
Table of Contents: .... Malware Detection with Sequence-Based Machine Learning and Deep Learning -- 16. A Novel Study...

7
Published 2013
The MIT Press

8
by Vagata, Pamela
Published 2019
O'Reilly
Subjects: ...Machine learning / http://id.loc.gov/authorities/subjects/sh85079324...

9
by Bodungen, Clint E., Singer, Bryan L., Shbeeb, Aaron, Hilt, Stephen
Published 2017
McGraw-Hill Education
Subjects: ...Machines automatiques / Sécurité / Mesures...

10
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Machine Learning Techniques. Artificial Intelligence Perspective on Digital Forensics. Review on Machine...

11
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Techniques -- Bulk Email Forensics -- Analyzing the Impact of a Virtual Machine on a Host Machine -- Temporal...

12
by Dale, Elizabeth
Published 2011
Cambridge University Press
Table of Contents: ...Machine generated contents note: 1. Criminal justice and the nation, 1789-1860; 2. Law and justice...

13
by Sarat, Austin, Malague, John, Wishloff, Sarah
Published 2019
Cambridge University Press
Table of Contents: ...Machine generated contents note: 1. Introduction: when the death penalty goes public; 2. Retention...

14
by Wells, Joseph T.
Published 2013
John Wiley & Sons, Inc.
Table of Contents: ... The Twin-Cities Machine; Running a Machine; The Team Versus the Machine; Ambulance Chasers, Runners...

15
by Quick, Darren
Published 2014
Syngess
Table of Contents: ... analysis -- Dropbox analysis : data remnants on user machines -- Google drive : forensic analysis of cloud...

16
by Marcella, Albert, Menendez, Doug
Published 2010
Auerbach Publications
... and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine...

17
by Davis, Frederick T.
Published 2019
Cambridge University Press
Table of Contents: ...Machine generated contents note: 1. Introduction; 2. The Federal structure: sources of the law; 3...

18
by Kubasiak, Ryan R.
Published 2009
Syngress Pub.
Table of Contents: ... and partitioning -- HFS plus file system -- FileVault -- Time machine -- Acquiring forensic images -- Recovering...

19
by Sonowal, Gunikhan
Published 2022
Apress
Table of Contents: ...: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep...

20
by Hayes, Darren R.
Published 2015
Pearson
Table of Contents: ...Machine generated contents note: Introduction -- Popular Myths about Computer Forensics -- Types...