|
Showing 1 - 25 of
38 matches in All Departments
New digital technologies, from AI-fired 'legal tech' tools to
virtual proceedings, are transforming the legal system. But much of
the debate surrounding legal tech has zoomed out to a nebulous
future of 'robo-judges' and 'robo-lawyers.' This volume is an
antidote. Zeroing in on the near- to medium-term, it provides a
concrete, empirically minded synthesis of the impact of new digital
technologies on litigation and access to justice. How far and fast
can legal tech advance given regulatory, organizational, and
technological constraints? How will new technologies affect lawyers
and litigants, and how should procedural rules adapt? How can
technology expand - or curtail - access to justice? And how must
judicial administration change to promote healthy technological
development and open courthouse doors for all? By engaging these
essential questions, this volume helps to map the opportunities and
the perils of a rapidly digitizing legal system - and provides
grounded advice for a sensible path forward.
Can machine learning techniques solve our computer security
problems and finally put an end to the cat-and-mouse game between
attackers and defenders? Or is this hope merely hype? Now you can
dive into the science and answer this question for yourself. With
this practical guide, you’ll explore ways to apply machine
learning to security issues such as intrusion detection, malware
classification, and network analysis. Machine learning and security
specialists Clarence Chio and David Freeman provide a framework for
discussing the marriage of these two fields, as well as a toolkit
of machine-learning algorithms that you can apply to an array of
security problems. This book is ideal for security engineers and
data scientists alike. Learn how machine learning has contributed
to the success of modern spam filters Quickly detect anomalies,
including breaches, fraud, and impending system failure Conduct
malware analysis by extracting useful information from computer
binaries Uncover attackers within the network by finding patterns
inside datasets Examine how attackers exploit consumer-facing
websites and app functionality Translate your machine learning
algorithms from the lab to production Understand the threat
attackers pose to machine learning solutions
Drawing on a wide and rich array of sources, this book explores the
nature and extent of Dutch trade and commerce in the Rio de la
Plata during three decades of the least-studied century (1650-1750)
of Spain's rule in the Americas. In doing so, it raises important
questions about trade in colonial South America and how it was
impacted by the Dutch, suggesting that these transactions were
carried out within the confines of the law, contradicting common
beliefs among scholars that this trading was not regulated. The
book contributes to a growing literature on contraband trade,
administration, networks, and corruption while challenging
narratives of exclusively Spanish influence on the Americas.
|
Rame (Paperback)
David Freeman
|
R242
R198
Discovery Miles 1 980
Save R44 (18%)
|
Ships in 9 - 15 working days
|
"The Iron Lady," the definitive Margaret Thatcher biography, is
available just in time for the movie starring Meryl Streep as one
of the most infamous figures in postwar politics.
Whether you love her or hate her, Margaret Thatcher's impact on
twentieth-century history is undeniable. From her humble,
small-town upbringing to her rise to power as the United Kingdom's
first female prime minister, to her dramatic fall from grace after
more than three decades of service, celebrated biographer John
Campbell delves into the story of this fascinating woman's life as
no one has before. The result of more than nine years of meticulous
research, "The Iron Lady" is the only balanced, unvarnished
portrait of Margaret Thatcher, one of the most vital and
controversial political figures of our time.
A Review of Ethical Issue Considerations in the Information Systems
Research Literature summarizes the treatment of ethical
considerations that have been made by information systems
researchers. When examined in this fashion, one finds that
information systems research over the years that incorporates an
ethical perspective has transitioned from a focus on codes of
ethics and general notions of behavior to more sophisticated models
of piracy, privacy, and security. There has been a steady focus on
theory development over the last ten years, as well as constant
scrutiny on the obligations of information system researchers to
both the subjects of studies and the consumers of the research
results. The monograph begins with a brief introduction and review
of major ethical theories. This is followed by the category
summaries, which are listed in alphabetical order to enable a
reader to jump to a specific topic. The last sections address
future research opportunities and the conclusions drawn.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
|