Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
ChapterXXXIII0LEGALREGULATIONSINTHEBATTLEAGAINST
ORGANIZEDCRIMEllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
1lPreliminaryremarkslllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
2lSecret(anonymous)witnessllllllllllllllllllllllllllllllllllllllllllllllllllll
3lAgreementsbetweentheprosecutorandtheaccusedllllllllllllllllllllllllllllll
4lCrownwitnessllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
5lMonitoringandrecordingofconversationslllllllllllllllllllllllllllllllllllllll
6lControlledpurchaselUndercoverpoliceagentandcovertsurveillancelllllllllllllll
Supplementaryliteraturellllllllllllllllllllllllllllllllllllllllllllllllllllllllll
Partthree
DIGITALFORENSICS
ChapterXXXIV0THECONCEPTOFCYBERSPACEANDTHESCOPEOF
DIGITALFORENSICSlllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
1lCyberspacelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
2lTeapplicationofdigitalforensicslllllllllllllllllllllllllllllllllllllllllllllll
Supplementaryliteraturellllllllllllllllllllllllllllllllllllllllllllllllllllllllll
821
821
821
823
826
832
834
836
841
841
843
847
ChapterXXXV0DIGITALSOURCESOFINFORMATIONllllllllllllllllllllllllll
848
1lEssenceoftheconceptofinformationllllllllllllllllllllllllllllllllllllllllllll
848
2lSocialnetworkingsiteslllllllllllllllllllllllllllllllllllllllllllllllllllllllll
851
AlFacebookllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
853
BlFacebook’sprogramminglanguageslllllllllllllllllllllllllllllllllllllllllll
855
ClInformationsecurityinFacebooklllllllllllllllllllllllllllllllllllllllllllll
856
DlPhishingscamsonFacebooklllllllllllllllllllllllllllllllllllllllllllllllll
857
3lEmpiricalmethodsofobtaininginformationlllllllllllllllllllllllllllllllllllll
858
4lMethodsofimplementinglearningalgorithmsllllllllllllllllllllllllllllllllllll
865
AlGenerationofrulesusingdecisiontreeslllllllllllllllllllllllllllllllllllllll
864
BlAcquisitionofknowledgeusingthegenerationof‘covers’llllllllllllllllllllllll
865
ClAcquisitionofknowledgeusingsemanticnetworkslllllllllllllllllllllllllllll
866
DlNeuralnetworksllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
866
5lGooglelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
868
Supplementaryliteraturellllllllllllllllllllllllllllllllllllllllllllllllllllllllll
872
ChapterXXXVI0ARTIFICIALINTELLIGENCElllllllllllllllllllllllllllllllllll
1lEssenceofartificialintelligencelllllllllllllllllllllllllllllllllllllllllllllllll
2lDimcultiesindesigningan‘intelligent’computerlllllllllllllllllllllllllllllllll
3lProspectsfordevelopingmachineswithintelligencesuperiortohumanslllllllllllll
4lArtificialintelligenceinforensicsllllllllllllllllllllllllllllllllllllllllllllllll
5lExpandingcapabilitiesvsllimitsoffunctionsoftheobjectivelllllllllllllllllllllll
6lPolandandworkrelatedtoartificialintelligencellllllllllllllllllllllllllllllllll
7lAIpolicycoordinationlllllllllllllllllllllllllllllllllllllllllllllllllllllllll
Supplementaryliteraturellllllllllllllllllllllllllllllllllllllllllllllllllllllllll
874
874
880
889
892
895
897
898
898
ChapterXXXVII0ELECTRONICSURVEILLANCEMETHODSlllllllllllllllllllll
900
1lPreliminaryremarkslllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
900
27