-
1
David Busch's DJI Mini 3/Mini 3 Pro Guide to Drone Photography
Published 2024Call Number:Located:Online Book -
2
-
3
Wallace Stegner's Unsettled Country : ruin, realism and possibility in the American West /
Published 2024Call Number:Located:Online Book -
4
Imposing certain sanctions on persons undermining peace, security, and stability in the West Bank : message from the President of the United States transmitting executive order of national emergency with respect to the situation in the West Bank, pursuant to 50 U.S.C. 1703(b); Public Law 95-223, Sec. 204(b); (91 Stat. 1627) and 50 U.S.C. 1641(b); Public Law 94-412, Sec. 401(b); (90 Stat. 1257).
Published 2024Call Number:Located:Government Document Online Book -
5
Efforts to address ritual abuse and sacrifice in Africa : hearing before the Committee on Foreign Affairs, House of Representatives, One Hundred Eighteenth Congress, first session,...
Published 2024Call Number:Located:Government Document Online Book -
6
Summary: FWS employee used Government travel and purchase cards for personal expenses /
Published 2024Call Number:Located:Government Document Online Book -
7
Nursing informatics for the advanced practice nurse : patient safety, quality, outcomes, and interprofessionalism /
Published 2023Call Number:Located:Online Book -
8
Reporting on sexual violence in the #MeToo era /
Published 2023Table of Contents: “…Reporting on sexual violence in the pre- and post-#MeToo 2.0 era / Andrea Baker and Usha Manchanda Rodrigues -- Objectively silencing survivors during #MeToo 2.0 : the case of the US news media and Donald Trump / Lindsey Blumell and Jen Huemmer -- #MeToo 2.0 as a critical incident : voices, silencing, and reckoning in Denmark and Sweden / Jannie Møller Hartley and Tina Askanius -- Marginalizing the reporting of #MeToo 2.0 with structural bias in Japan / Misook Lee -- The disquieting demise of a "watershed" movement in India / Chindu Sreedharan and Einar Thorsen -- The significance of intersectionality in the United States' media coverage of the #MeToo 2.0 movement / Carly Gieseler -- Intersectionality and hashtag journalism : giving women and girls of color a voice in the United States' media coverage of the R. …”
Call Number:Located:
Online Book -
9
David Busch's DJI Mavic Air 2/2S : guide to drone photography /
Published 2023Call Number:Located:Online Book -
10
Suitable strangers : the Hungarian Revolution, a hunger strike, and Ireland's first refugee camp /
Published 2023Call Number:Located:Online Book -
11
-
12
Countering cyberterrorism : the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity /
Published 2023Table of Contents: “…Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Governments Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. .…”
Call Number:Located:Online Book -
13
The rules of rescue : cost, distance, and effective altruism /
Published 2023Call Number:Located:Book -
14
How to end a war : essays on justice, peace, and repair /
Published 2023Call Number:Located:
Online Book -
15
Placemaking and cultural landscapes /
Published 2023Table of Contents: “…4 Cultural Landscapes: Integrating Culture and Nature to Uplift Global Sustainability Through the Lenses of the UN SDGs 2030 Agenda -- 4.1 Introduction -- 4.2 The Concept of Sustainability and the UN SDGs -- 4.3 The Biocultural Diversity of Cultural Landscapes -- 4.4 Sustainability and Cultural Landscapes -- 4.5 Budj Bim, Australia, Indigenous Landscape -- 4.6 Jackson Park, Unites States, Designed Historic Landscape -- 4.7 UNESCO HUL and Indian Urban Heritage -- 4.8 Conclusion -- References -- 5 Branding the Image of Religious Heritage in India -- 5.1 Introduction…”
Call Number:Located:Online Book -
16
Mathematical challenges for all /
Published 2023Table of Contents: “…Problem Sets in School Textbooks: Examples from the United States -- Chapter 25. Exams in Russia as an Example of Problem Set Organization -- Chapter 26. …”
Call Number:Located:Online Book -
17
Learn enough Python to be dangerous : a tutorial introduction to programming with Python.
Published 2023Call Number:Located:Online Video -
18
Yanks in blue berets American UN peacekeepers in the Middle East /
Published 2023Call Number:Located:Online Book -
19
Providing for consideration of the bill (H.R. 734) to amend the Education Amendments of 1972 to provide that for purposes of determining compliance with title IX of such Act in ath...
Published 2023Call Number:Located:Government Document Online Book -
20
ITNG 2023 20th International Conference on Information Technology-New Generations /
Published 2023Table of Contents: “…Chapter 2 -- Getting Local and Personal: Toward Building a Predictive Model for COVID in Three United States Cities. …”
Call Number:Located:Online Conference Proceeding Book