Bibliography

  1. Abagnale, F. W., & Redding, S. (2002). Catch me if you can: The true story of a real fake. Broadway Books.
  2. Ahmad, K. (2022, November 1). What is the Great Firewall of China and how does it work? MUO. www.makeuseof.com/what-is-great-firewall-china
  3. Al-Sibai, N. (2023, May 22). Meet the AI researcher building his own agi. Futurism. https://futurism.com/ben-goertzel-interview
  4. Alim, S. A., & Rashid, N. K. A. (2018, December 12). Some commonly used speech feature extraction algorithms. IntechOpen. www.intechopen.com/chapters/63970
  5. Arthur, C. (2013, May 16). LulzSec: What they did, who they were and how they were caught. The Guardian. www.theguardian.com/technology/2013/may/16/lulzsec-hacking-fbi-jail
  6. arXivLabs. (2023, March 27). “GPT-4 technical report.” arXiv.org. https://arxiv.org/abs/2303.08774
  7. Asurion. Americans now check their phones 352 times per day. Asurion. Retrieved August 28, 2023, from  www.asurion.com/connect/news/tech-usage
  8. Atwell, H., & Barsky, J. (Hosts). (2020, May 18). The Illegal | KGB [Audio podcast episode]. True Spies. Spyscape. https://spyscape.com/podcast/the-illegal
  9. Bhatt, S. (2018, March 19). Reinforcement learning 101. Medium. Retrieved April 22, 2023, from https://towardsdatascience.com/reinforcement-learning-101-e24b50e1d292
  10. Beaumont-Thomas, B. (2014, July 10). North Korea complains to UN about Seth Rogen comedy The Interview. The Guardian. www.theguardian.com/film/2014/jul/10/north-korea-un-the-interview-seth-rogen-james-franco
  11. Berg, M., ...

Get The Language of Deception now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.