1
by Serra, Danila
Published 2012
Emerald
Table of Contents: .... Anticorruption policies : lessons from the lab / Klaus Abbink, Danila Serra -- ch. 5. On the external validity...

2
Published 2012
Springer New York
...Strategies such as risk terrain modeling and validity testing for security screening instruments...

3
Published 2010
Springer New York
Table of Contents: ... in Criminological Research -- Statistical Power -- Descriptive Validity and Transparent Reporting in Randomised...

4
by Dahlbäck, Olof
Published 2003
Springer Netherlands
Table of Contents: .... Descriptive Validity of the Rationality Theories of Expected Utility Maximization -- 4. Interpersonal...

5
by Akinlabi, Oluwagbenga Michael
Published 2022
Palgrave Macmillan
... and the validity of procedural justice theory in a post-colonial African context where corruption, brutality...

6
Published 2007
Springer New York
Table of Contents: ... of Official Statistics on Trafficking in Human Beings for Sexual Exploitation and their Validity in the 25 EU...

7
Published 1972
Springer Berlin Heidelberg
Table of Contents: ... -- Investigations on the Validity of Prediction Tables in the Field of Probation -- Research into the Effectiveness...

8
by Troncone, Paul, Albing, Carl
Published 2019
O'Reilly Media
Table of Contents: ...: Software inventory ; Tool: Validating configuration ; Tool: Account auditing ; Conclusion...

9
by Sachowski, Jason
Published 2019
CRC Press
Table of Contents: .... Investigative process models -- B. Education and professional certifications -- C. Tool and equipment validation...

10
by Brodsky, Stanley L., O'Neal Smitherman, H.
Published 1983
Springer US
... administered under controlled conditions, with known stimulus properties and validity indicators. The CPI...

11
by Pearson, Stephen
Published 2010
Syngress
Table of Contents: ... and Shareware as Cell Phone Forensic/analysis Tools; Using Cross Validation With your Tools...

12
by Mohammed, Muhiballah
Published 2023
Packt Publishing Ltd.
Table of Contents: ... -- Validating the computer name -- Identifying time zones -- Identifying services -- Installed applications...

13
by Sachowski, Jason
Published 2016
Syngress
Table of Contents: ...; SCENARIO #1: REDUCING THE IMPACT OF CYBERCRIME; SCENARIO #2: VALIDATING THE IMPACT OF CYBERCRIME...

14
by Sammons, John
Published 2016
Syngress is an imprint of Elsevier
Table of Contents: ... and Chipoff analysis -- advantages, challenges, and threats; Validation and best practices of mobile forensic...

15
by Carvey, Harlan A.
Published 2014
Syngress
Table of Contents: ...; Goals; Tools versus processes; The tool validation myth-odology; Locard's exchange principle; Avoiding...

16 Table of Contents: ... -- Dataset Preprocessing Technique; 6.2.2 -- Validation Technique...

17
by Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.
Table of Contents: ... Validation Anomalies; Recipe 5-6: Detecting Request Method Anomalies; Recipe 5-7: Detecting Invalid URI Data...

18
Published 2013
Springer New York
... system.  Some early simulation projects were limited due to lack of data available to validate models...

19
Published 1992
Springer Netherlands
... in the field of restorative justice and help build valid guidelines for an international evaluation research...

20
by Muller, Lorraine
Published 2024
Taylor & Francis
... with the pandemic, Muller's research was validated as the world witnessed the Australian culture undergoing major...