1
by Robinson, Paul H.
Published 2013
Oxford University Press
.... Intuitions of Justice and the Utility of Desert sketches the contours of a wide range of lay judgments...

2
by Dahlbäck, Olof
Published 2003
Springer Netherlands
Table of Contents: .... Descriptive Validity of the Rationality Theories of Expected Utility Maximization -- 4. Interpersonal...

3
by Rojek, Jeff, Martin, Peter, Alpert, Geoffrey P.
Published 2015
Springer New York
... managers consider and utilize research in policing and criminal justice and its findings from a management...

4
Published 2012
Springer New York

5
by Dean, Geoff
Published 2014
Springer International Publishing
... the practical value and utility of this neurocognitive Risk Assessment Toolbox. Preliminary research findings...

6
by McElwee, Gerard
Published 2015
Emerald
Table of Contents: ... : the U.S. prison system as a university of destructive utility / Mellani J. Day -- Conversations with a...

7
Published 2022
Palgrave Macmillan
Table of Contents: ...-Reflective Researcher and the Utility of the Research Diary -- Chapter 8: Risk factors related to sexual...

8
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep...

9
by Brodsky, Stanley L., O'Neal Smitherman, H.
Published 1983
Springer US
Table of Contents: ...1 Scale Needs and Utilization -- 2 Search and Selection of Scales for Review -- 3 Using...

10
Published 2018
Wiley
Table of Contents: ... Compliance; 4.3.1 Expected Utility; 4.3.2 Behavioral Models; 4.3.3 Psychic Costs and Social Customs; 4.4...

11
by Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.
Table of Contents: ...Recipe 4-3: Utilizing Real-time Blacklist Lookups (RBL)Recipe 4-4: Running Your Own RBL; Recipe 4-5...

12 Table of Contents: ... of Sanitization on Utility; Summary and Directions; References; ; ACCESS CONTROL AND INFERENCE FOR SOCIAL NETWORKS...

13
by Engebretson, Patrick
Published 2013
Syngress
... to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret...

14
by Wilson, Eric
Published 2016
punctum books
... dramatically shattering confrontation with an unspeakable reality. Apart from its obvious utilization...

15
by Graves, Michael W.
Published 2013
Addison-Wesley
...His detailed demonstrations often include the actual syntax of command-line utilities. Along...

16
Published 1990
Springer New York
... and change, and the strength and weakness of studies utilizing secondary data sources...

17
by Casey, Eoghan
Published 2010
Academic Press
... and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative...

18
by Furneaux, Nick
Published 2018
Wiley
... the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital...

19
by Faulkner, Elizabeth A.
Published 2023
Palgrave Macmillan
... and policy responses. Through utilizing what the author identifies as the ‘anti-trafficking machine’ as a...

20
by Gottschalk, Petter, Hamerton, Christopher
Published 2022
Palgrave Macmillan
... utilized in mitigating external and internal threats, the unique considerations involved in law enforcement...