-
1
David Busch's DJI Mini 3/Mini 3 Pro Guide to Drone Photography
Published 2024Call Number:Located:Online Book -
2
Until I find you : disappeared children and coercive adoptions in Guatemala /
Published 2024Call Number:Located:Online Book -
3
-
4
Funded! : essentials of grant writing for the human services /
Published 2024Call Number:Located:Book -
5
Wallace Stegner's Unsettled Country : ruin, realism and possibility in the American West /
Published 2024Call Number:Located:Online Book -
6
Imposing certain sanctions on persons undermining peace, security, and stability in the West Bank : message from the President of the United States transmitting executive order of national emergency with respect to the situation in the West Bank, pursuant to 50 U.S.C. 1703(b); Public Law 95-223, Sec. 204(b); (91 Stat. 1627) and 50 U.S.C. 1641(b); Public Law 94-412, Sec. 401(b); (90 Stat. 1257).
Published 2024Call Number:Located:Government Document Online Book -
7
Efforts to address ritual abuse and sacrifice in Africa : hearing before the Committee on Foreign Affairs, House of Representatives, One Hundred Eighteenth Congress, first session,...
Published 2024Call Number:Located:Government Document Online Book -
8
Summary: FWS employee used Government travel and purchase cards for personal expenses /
Published 2024Call Number:Located:Government Document Online Book -
9
Successful prosecution of intimate violence : making it offender-focused /
Published 2024Call Number:Located:
Online Book -
10
Nursing informatics for the advanced practice nurse : patient safety, quality, outcomes, and interprofessionalism /
Published 2023Call Number:Located:Online Book -
11
-
12
International comparison of pension systems : an investigation from consumers' viewpoint /
Published 2023Table of Contents: “…Intro -- Preface -- Contents -- Introduction -- The National Pension Systems and Financial Consumers: An International Comparative Perspective on the Key Linkages -- 1 Introduction -- 2 Current States and Trends Observed -- 3 Summary of Each Chapter -- 4 On Welfare-Enhancing Pension Reform -- 4.1 Reforming the Public Pensions -- 4.2 Reforming the Private Pensions -- 5 Conclusion -- Appendix 1: The Survey Results of the Pension Systems -- References -- Country Chapters -- Retirement Income Security in the United States: An Overview of the Public and Private Retirement System…”
Call Number:Located:Online Book -
13
Reporting on sexual violence in the #MeToo era /
Published 2023Table of Contents: “…Reporting on sexual violence in the pre- and post-#MeToo 2.0 era / Andrea Baker and Usha Manchanda Rodrigues -- Objectively silencing survivors during #MeToo 2.0 : the case of the US news media and Donald Trump / Lindsey Blumell and Jen Huemmer -- #MeToo 2.0 as a critical incident : voices, silencing, and reckoning in Denmark and Sweden / Jannie Møller Hartley and Tina Askanius -- Marginalizing the reporting of #MeToo 2.0 with structural bias in Japan / Misook Lee -- The disquieting demise of a "watershed" movement in India / Chindu Sreedharan and Einar Thorsen -- The significance of intersectionality in the United States' media coverage of the #MeToo 2.0 movement / Carly Gieseler -- Intersectionality and hashtag journalism : giving women and girls of color a voice in the United States' media coverage of the R. …”
Call Number:Located:
Online Book -
14
David Busch's DJI Mavic Air 2/2S : guide to drone photography /
Published 2023Call Number:Located:Online Book -
15
Suitable strangers : the Hungarian Revolution, a hunger strike, and Ireland's first refugee camp /
Published 2023Call Number:Located:Online Book -
16
-
17
Integrative social work practice with refugees, asylum seekers, and other forcibly displaced persons /
Published 2023Table of Contents: “…Murakami) -- Part III: Specific Populations) -- 15: Statelessness and Displacement: The Cause, Consequences, and Challenges of Statelessness and the Capabilities Required of Social Workers (Jason Tucker) -- 16: Social Work Practice with Asylum Seekers (Tanzilya Oren) -- 17: Migration of LGBTQI+ People: Sexual and/or Gender Minority Migrants, Refugees, and Asylum-seekers (Edward Ou Jin Lee, Ahmed Hamila, Sophia Koukoui, Yann Zoldan, Renata Militzer, Sebastien Chehaitly, Catherine Baillargeon, and Annie Pullen Sansfacon) -- 18: Social Work with Displaced Children (Sana Al-Hyari & Raghda Butros) -- 19: Bridging Micro and Macro Practice to Respond to Violence Against Women and Girls in Dynamic Contexts: Lessons Learned from the South Pacific Context (Abigail Erikson, Doris Puiahi, and Karin Wachter) -- 20: Lives in the Shadows: International Human Trafficking in the United States (Jessica Gorelick & Ileana Taylor) -- Part IV: Looking Forward) -- 21: The Role of Social Work in the Context of Forced Migration: A Global Perspective (Mashura Akilova) -- Appendix: Glossary of Terms (Bethel Assefa) -- Index.…”
Call Number:Located:Online Book -
18
Disability in the workplace : a Caribbean perspective /
Published 2023Call Number:Located:Online Book -
19
Countering cyberterrorism : the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity /
Published 2023Table of Contents: “…Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Governments Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. .…”
Call Number:Located:Online Book -
20
Contemporary strategic Chinese American business negotiations and market entry /
Published 2023Call Number:Located:Online Book